• 动态分布式防御安全管理策略

    Dynamic Distributed Defense Security Management Policy.

    youdao

  • 安全系统一步制定一个合理安全管理策略

    The first step for security system is to set up a reasonable security management strategy.

    youdao

  • 针对不同道路情况制定合理高速公路限速以及交通安全管理策略

    Moreover, aiming at different road condition, this paper establishes reasonable expressway speed limit in fog area and traffic safety management strategy.

    youdao

  • 通过高校数字图书馆网络安全面临威胁进行分析提出了一系列的网络安全管理策略

    Digital library of the University analysis of the threat to network security, made a series of network security management strategy.

    youdao

  • 本文介绍它的安全管理策略,并论述了安全管理系统的组成以及模块基本功能设计思路

    This paper discusses the security management strategy. Itdescribes the structure of SMS. the function of the various modules that comprise the SMSand their design considerations.

    youdao

  • 确定几种类型安全管理策略防御说明如何利用它们,以确保安全业务应用信息技术

    Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology.

    youdao

  • 我们应该创建安全智能策略其中包含了流程中心风险管理

    We should also create a security intelligence strategy that includes process centric risk management.

    youdao

  • 治理风险管理提供更大SOA环境中实现强制执行安全策略机制

    Governance and risk management provide the mechanism to implement and enforce security policies within the larger SOA environment.

    youdao

  • ESB面向服务的解决方案治理流程间接的作用,因为治理驱动着用于安全管理服务交互性策略

    The ESB plays an indirect part in the governance processes for a service-oriented solution in that governance drives the policies for security, management, and service interactivity.

    youdao

  • 下面所述一个基于策略服务安全管理典型流程可以分为五大步骤

    A typical process of policy based service security management can be divided into five steps and described as follows.

    youdao

  • 创建安全策略安全管理创建安全标签,安全标签也是安全策略一部分。

    After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.

    youdao

  • 这些策略安全服务器集中管理并且发送根据需要保护数据代理

    The policies are centrally managed by the security server and are sent to the agents that protect data as necessary.

    youdao

  • 各个中介模式适当地放在中介流中实现预期交互目标以及执行管理安全策略

    Individual mediation patterns are placed appropriately in the mediation flow to achieve the goals of the intended interaction as well as to enforce management and security policies.

    youdao

  • 所有SOA安全核心基于策略基础设施策略管理

    At the core of all SOA security is a policy-based infrastructure and management of the policies.

    youdao

  • 服务运行时策略用于定义管理安全路由可靠性仲裁

    Run-time policies for services define and manage security, routing, reliability, mediation.

    youdao

  • 创建安全策略之后安全管理创建安全策略中的安全标签

    After creating a security policy, the security administrator creates security labels that are part of that policy.

    youdao

  • 因此,对于移动设备管理加强策略保证安全重要原则。

    So managing and enforcing policies is critical to maintaining any semblance of security on these devices.

    youdao

  • 这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    youdao

  • 可能出现下面的情况:一个安全设置几年首次定义队列管理合适的,但现在不再符合站点安全策略

    It could be that a security setup that was acceptable several years ago when the queue manager was first defined is no longer consistent with your site security policy.

    youdao

  • 信息管理一个庞大主题涉及到有关内容管理策略分布式访问联合安全讨论

    Information management is a huge topic that can involve discussions of content-management strategies, distributed access, federated security, and much more.

    youdao

  • 安全策略主要关注用户管理数据保护虚拟保护。

    A cloud security policy focuses on managing users, protecting data, and securing virtual machines.

    youdao

  • 其他中介模式提供了安全管理策略定义直接间接访问以便中介能够执行适当控制

    Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.

    youdao

  • 业务流程策略管理组件使用下面安全组件实现业务应用程序安全职责

    The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.

    youdao

  • 存在用于其他服务数据交互的达成一致的安全标准并且没有用于策略管理已定义角色和职责。

    There are no agreed-upon security standards for interacting with other services and data, and no defined roles and responsibilities for policy administration.

    youdao

  • 可以安全策略管理委托给程序员熟悉应用程序实现语言

    Administration of security policies can be delegated to a nonprogrammer or to someone not familiar with an application's implementation language.

    youdao

  • 内容门户管理必须使用内容属性和数据(包括用于安全策略内容属性和元数据)标识所有内容。

    All content must be tagged with content attributes and metadata, including those for security policies, by content administrators and portal administrators.

    youdao

  • 管理能够定于安全策略授权项目经理选择对于他们项目最好安全策略

    Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.

    youdao

  • 使安全管理能够通过启用几个策略组合出复杂公开效果同时保持各个策略简单直观

    This allows the security administrator to compose more complex disclosure effects by enabling several policies, while each individual policy is relatively simple and intuitive.

    youdao

  • 一层可以看作业务安全服务IT 安全服务之间链接它包括策略管理分发领域

    This tier can be thought of as the link between business security services and IT security services and includes areas such as policy administration and distribution.

    youdao

  • 数据库安全管理通过创建安全策略来配置LBAC系统

    The database security administrator configures the LBAC system by creating security policies.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定