有关更多信息,请参见安全策略模型。
有关证据、代码组和权限集的更多信息,请参见安全策略模型。
For more information about evidence, code groups, and permission sets, see Security Policy Model.
对于另一个模型,您可能会希望采用相反的方式:以安全策略和过程为基础构建技术和控制。
For another model, you may wish to have the reverse: technologies and controls built upon the foundation of security policies, and procedures.
对于一个模型,您可能会希望以技术为基础构建安全策略和控制。
For one model, you may wish to have security policies and controls built upon the foundation of technologies.
SOA编程模型必须确保每个服务调用都符合对请求者和服务端点均有效的安全策略。
An SOA programming model must ensure that each service invocation adheres to security policies that are valid for both the requester and service endpoint.
对于云交付模型,使用者对部署的应用程序、操作系统、硬件、软件、存储和网络的控制能力不同,这会影响云安全策略。
It is influenced by how much control a consumer can have over deployed applications, operating systems, hardware, software, storage and networking for a cloud delivery model.
此模型由IT安全服务、安全策略基础设施、业务安全服务和安全支持因素组成。
This model consists of it security services, security policy infrastructure, business security services, and security enablers.
接着在此基础上介绍安全策略协商模型的系统结构,主要包含协商协议,协商对象,协商策略等部分。
Then it gives the structure of security policy negotiation model including negotiation protocol, negotiation object and negotiation tactics etc.
安全数据库管理系统的安全策略可以为数据库提供强大的安全功能,现在BLP模型是用得比较普遍的策略模型之一。
The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.
多级安全数据库的安全策略需要各种模型来表达,访问控制模型是其中之一。
Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.
本文基于安全策略的分层管理模型,提出了一个集目标求精和实体求精为一体的安全策略逐级求精算法。
Integrated with goal refinement method and entity refinement method, an algorithm of policy refinement is proposed in this paper on the basis of layered-policy model for security policy.
模型以多级安全策略为基础,以全面增强主机安全。
This model based on the multilevel security policy, to increase host security in every aspects.
本文给出了服务计算的安全模型,分析了这种应用逻辑与安全策略分离的基于信任域的安全模型的主要思想和优点。
A security model of services computing is presented in this paper. Main idea and advantages of trust domain based security model are analyzed.
第四章通过信息系统开发的安全策略的研究并结合第三章得到了列车运行图信息系统安全模型。
Chapter 4 gives the security model of the TDIS by the studies on security strategies of information system.
现有的网格安全体系GSI主要是通过公钥体系及建立在其上的分布式信任模型来建立与维护虚拟组织内部的安全策略空间。
Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.
现有的网格安全体系GSI主要是通过公钥体系及建立在其上的分布式信任模型来建立与维护虚拟组织内部的安全策略空间。
Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.
应用推荐