• 有关更多信息请参见安全策略模型

    For more information, see Security Policy Model.

    youdao

  • 有关证据代码权限更多信息请参见安全策略模型

    For more information about evidence, code groups, and permission sets, see Security Policy Model.

    youdao

  • 对于另一个模型可能会希望采用相反方式:以安全策略过程为基础构建技术控制

    For another model, you may wish to have the reverse: technologies and controls built upon the foundation of security policies, and procedures.

    youdao

  • 对于一个模型可能会希望技术基础构建安全策略控制

    For one model, you may wish to have security policies and controls built upon the foundation of technologies.

    youdao

  • SOA编程模型必须确保每个服务调用都符合请求者服务端点均有效安全策略

    An SOA programming model must ensure that each service invocation adheres to security policies that are valid for both the requester and service endpoint.

    youdao

  • 对于交付模型使用者部署的应用程序操作系统硬件软件存储网络控制能力不同,这会影响安全策略

    It is influenced by how much control a consumer can have over deployed applications, operating systems, hardware, software, storage and networking for a cloud delivery model.

    youdao

  • 模型IT安全服务安全策略基础设施业务安全服务安全支持因素组成

    This model consists of it security services, security policy infrastructure, business security services, and security enablers.

    youdao

  • 接着基础上介绍安全策略协商模型系统结构主要包含协商协议,协商对象,协商策略等部分

    Then it gives the structure of security policy negotiation model including negotiation protocol, negotiation object and negotiation tactics etc.

    youdao

  • 安全数据库管理系统安全策略可以数据库提供强大的安全功能,现在BLP模型用得比较普遍策略模型之一

    The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.

    youdao

  • 多级安全数据库安全策略需要各种模型表达访问控制模型其中之一

    Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.

    youdao

  • 本文基于安全策略分层管理模型,提出了一个目标实体求精为一体的安全策略逐级求精算

    Integrated with goal refinement method and entity refinement method, an algorithm of policy refinement is proposed in this paper on the basis of layered-policy model for security policy.

    youdao

  • 模型多级安全策略为基础,全面增强主机安全

    This model based on the multilevel security policy, to increase host security in every aspects.

    youdao

  • 本文给出了服务计算安全模型分析了这种应用逻辑与安全策略分离的基于信任安全模型主要思想优点

    A security model of services computing is presented in this paper. Main idea and advantages of trust domain based security model are analyzed.

    youdao

  • 第四通过信息系统开发安全策略研究并结合第三章得到了列车运行图信息系统安全模型

    Chapter 4 gives the security model of the TDIS by the studies on security strategies of information system.

    youdao

  • 现有网格安全体系GSI主要是通过公钥体系建立其上的分布式信任模型来建立与维护虚拟组织内部安全策略空间

    Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.

    youdao

  • 现有网格安全体系GSI主要是通过公钥体系建立其上的分布式信任模型来建立与维护虚拟组织内部安全策略空间

    Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定