动态分布式防御安全管理策略。
安全系统的第一步是制定一个合理的安全管理策略。
The first step for security system is to set up a reasonable security management strategy.
并针对不同道路情况制定合理的高速公路雾区限速以及交通安全管理策略。
Moreover, aiming at different road condition, this paper establishes reasonable expressway speed limit in fog area and traffic safety management strategy.
通过对高校数字图书馆的网络安全面临的威胁进行分析,提出了一系列的网络安全管理策略。
Digital library of the University analysis of the threat to network security, made a series of network security management strategy.
本文介绍它的安全管理策略,并论述了安全管理系统的组成以及各模块的基本功能和设计思路。
This paper discusses the security management strategy. Itdescribes the structure of SMS. the function of the various modules that comprise the SMSand their design considerations.
确定几种类型的安全管理策略和防御,并说明如何利用它们,以确保安全,业务应用信息技术。
Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology.
我们还应该创建安全智能策略,其中包含了以流程为中心的风险管理。
We should also create a security intelligence strategy that includes process centric risk management.
治理和风险管理提供了在更大的SOA环境中实现和强制执行安全策略的机制。
Governance and risk management provide the mechanism to implement and enforce security policies within the larger SOA environment.
ESB在面向服务的解决方案的治理流程中起着间接的作用,因为治理驱动着用于安全、管理和服务交互性的策略。
The ESB plays an indirect part in the governance processes for a service-oriented solution in that governance drives the policies for security, management, and service interactivity.
如下面所述,一个基于策略的服务安全管理的典型流程可以分为五大步骤。
A typical process of policy based service security management can be divided into five steps and described as follows.
创建好安全策略后,安全管理员创建安全标签,安全标签也是安全策略的一部分。
After creating a security policy, the security administrator creates objects, called security labels that are also part of that policy.
这些策略由安全服务器集中管理,并且发送到根据需要保护数据的代理。
The policies are centrally managed by the security server and are sent to the agents that protect data as necessary.
各个中介模式被适当地放在中介流中以实现预期的交互目标,以及执行管理和安全策略。
Individual mediation patterns are placed appropriately in the mediation flow to achieve the goals of the intended interaction as well as to enforce management and security policies.
所有SOA安全的核心都是基于策略的基础设施和策略的管理。
At the core of all SOA security is a policy-based infrastructure and management of the policies.
服务的运行时策略用于定义和管理安全、路由、可靠性和仲裁。
Run-time policies for services define and manage security, routing, reliability, mediation.
创建安全策略之后,安全管理员将创建安全策略中的安全标签。
After creating a security policy, the security administrator creates security labels that are part of that policy.
因此,对于移动设备的管理和加强策略是保证其安全的重要原则。
So managing and enforcing policies is critical to maintaining any semblance of security on these devices.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
可能出现下面的情况:一个安全性设置在几年前首次定义队列管理器时是合适的,但现在不再符合您站点的安全策略。
It could be that a security setup that was acceptable several years ago when the queue manager was first defined is no longer consistent with your site security policy.
信息管理是一个庞大的主题,可涉及到有关内容管理策略、分布式访问、联合安全性等的讨论。
Information management is a huge topic that can involve discussions of content-management strategies, distributed access, federated security, and much more.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
其他中介模式提供了对安全和管理策略定义点的直接或间接访问,以便中介流能够执行适当的控制。
Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.
业务流程和策略管理组件使用了下面的安全组件,以实现它对业务应用程序的安全职责。
The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.
不存在用于与其他服务和数据交互的达成一致的安全标准,并且没有用于策略管理的已定义的角色和职责。
There are no agreed-upon security standards for interacting with other services and data, and no defined roles and responsibilities for policy administration.
可以将安全策略的管理委托给非程序员或不熟悉应用程序实现语言的人。
Administration of security policies can be delegated to a nonprogrammer or to someone not familiar with an application's implementation language.
内容和门户管理员必须使用内容属性和元数据(包括用于安全策略的内容属性和元数据)标识所有内容。
All content must be tagged with content attributes and metadata, including those for security policies, by content administrators and portal administrators.
管理员能够定于安全策略,并授权项目经理选择对于他们的项目最好的安全策略。
Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.
这使安全管理员能够通过启用几个策略,组合出更复杂的公开效果,同时保持各个策略简单且直观。
This allows the security administrator to compose more complex disclosure effects by enabling several policies, while each individual policy is relatively simple and intuitive.
这一层可以看作业务安全服务与IT 安全服务之间的链接,它包括策略管理和分发等领域。
This tier can be thought of as the link between business security services and IT security services and includes areas such as policy administration and distribution.
数据库安全管理员通过创建安全策略来配置LBAC系统。
The database security administrator configures the LBAC system by creating security policies.
应用推荐