首先在分析嵌入式实时数据库安全要求的基础上,给出了一个三层安全控制模型。
This passage bulids a secure control model with three layers on the ERTDB security requirements firstly, and then proposes a secure optimistic concurrency control strategy.
本文对SSL、SET两个电子商务安全协议作一比较,并针对不同的安全需要,构造一个分级安全控制模型,较好地改进了SET协议。
This article compares SSL with SET protocol, and constructs a hierarchical safety control model to suit for different safety requirements, this model will improve SET protocol.
对于另一个模型,您可能会希望采用相反的方式:以安全策略和过程为基础构建技术和控制。
For another model, you may wish to have the reverse: technologies and controls built upon the foundation of security policies, and procedures.
对于一个模型,您可能会希望以技术为基础构建安全策略和控制。
For one model, you may wish to have security policies and controls built upon the foundation of technologies.
SCA还为单个服务集合的业务解决方案的组装提供了一个模型,并控制解决方案的各个方面,如访问方法和安全。
SCA also provides a model for the assembly of business solutions from collections of individual services, with control over aspects of the solution such as access methods and security.
由于合作伙伴组织的员工和角色由合作伙伴组织控制,因此最好采用联合安全模型。
Because the employees and roles of the partner organizations are controlled by the partner organization, it's best to keep the federated security model.
所有这些内容控制着系统的总体安全模型。
因此,管理保留了对访问模型特定集合的控制权,这就阻止了潜在的安全性入侵。
Thus, management retains control over who can access each specific set of models, which prevents potential security violations.
对于云交付模型,使用者对部署的应用程序、操作系统、硬件、软件、存储和网络的控制能力不同,这会影响云安全策略。
It is influenced by how much control a consumer can have over deployed applications, operating systems, hardware, software, storage and networking for a cloud delivery model.
区分上述两类用户的安全和访问控制模型。
A security and access control model that distinguishes between these two classes of users.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
为了应对新挑战,Max和同事一起,以分布式信息流控制(DecentralizedInformationFlow Control, DIFC)模型为基础,开发了开源web应用安全基础设施flume。
To respond to these challenges, Max and his colleagues have developed Flume, an open source web application security infrastructure based on a Decentralized Information Flow Control (DFIC) model.
访问控制模型是信息安全领域研究的重点之一。
The research of access control model is a topic of information security area.
在导入包含安全模型的文件之前,使用AdministrationConsole将包含多维数据集模型的文件导入InfoSphere Warehouse控制数据库。
Before you import the file containing your security model, import the file containing your cube model into the InfoSphere Warehouse control database using the Administration Console.
基于任务的授权控制(TBAC)则是以任务为中心,并采用动态授权的主动安全模型。
Task based access control (TBAC) is an initiative security model, where task is focus of work and dynamic authorization is used.
该模型以透明计算机系统为基础,利用透明计算技术对计算机内部的安全问题进行控制。
To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
采用消息过滤算法可以在支持对象模型的多级安全系统中实现强制访问控制。
Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
本文讨论了存取控制的策略、实现方法,分析了军用安全模型和数据库中的对象保护技术。
The thesis dissertates access control policies and access control implementations, analyzes military security model and object protection in databases.
该文首先通过将随机的、不可控的需求控制问题转化为安全库存设置问题的方法,建立了库存系统的仿真模型。
A simulation model of inventory system is set up through turning the stochastic and uncontrolled demand control problem into the method of setting up safe inventory.
给出了电力市场环境下基于电压安全的最优预测控制的模型及算法。
Proposes the model of optimal preventive control based on voltage security in electricity markets.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
模型依赖于一个消息安全处理模型和一个访问控制模型。
The implement of the model depends on a message processing security model and an access control model.
这个访问控制模型既能保护企业资源的安全,同时又能实现协作环境内的资源共享。
This AC model can protect the assets and share the resource in collaborative environment.
因此,在这样的一个模型下,必须对内网中所有实体对象进行更加全面、颗粒度更小的安全管理以及控制。
So beneath this security attacking model of inner-mesh, we have to get more special security control management for all the component points and participants.
利用激光在皮肤中的传导及应用红外传感器探测皮肤温度的原理,设计激光美容手术温度控制模型,控制激光手术安全。
Utilize the theory of laser conducting among skin and use infrared sensor to detect the skin temperature, design the laser operation temperature control model to improve the safety of laser operation.
多级安全数据库的安全策略需要各种模型来表达,访问控制模型是其中之一。
Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.
本文讨论了汽车自适应巡航控制跟随模式的两个问题,一是跟随模式安全车距的确定,二是跟随模式控制模型的建立。
This paper has discussed two aspects concerning the following mode of vehicle ACC, one is the safe distance of the following mode, the other is the control modeling of this mode.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
应用推荐