• 当前几种分布安全模型进行分析评估

    Then it analyses and evaluates several distributed security models nowadays.

    youdao

  • 为了应对挑战,Max同事一起,以分布信息流控制(DecentralizedInformationFlow Control, DIFC)模型为基础,开发了开源web应用安全基础设施flume

    To respond to these challenges, Max and his colleagues have developed Flume, an open source web application security infrastructure based on a Decentralized Information Flow Control (DFIC) model.

    youdao

  • 分布环境安全机制会实现一种高级复杂安全模型如图1所示。

    Distributed environment security implements an advanced and complex security model as shown in Figure 1.

    youdao

  • 我们首先强调安全分布环境重要性概述了DCE安全模型

    We started with a note on the importance of security in a distributed environment and an overview of DCE security model.

    youdao

  • 分布软件服务安全模型支持消息授权

    DSS Security Model supports Message Level Authorization.

    youdao

  • 扩充Equinox安全模型认证授权增强分布系统安全

    Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.

    youdao

  • 既然现在这些工具各种规模企业全球企业便携计算机上的一个基于WebSphereMQ客户机应用程序—访问,安全模型适应架构变化的要求。

    Now that those tools are accessible to every size shop — from global enterprises to a WebSphere MQ client-based application on a laptop — the security model can catch up to the architecture.

    youdao

  • 通过一部智能电话采用一个嵌入虚拟机监控程序单个设备可以通过单独容器(VMs)中隔离两个使用模型同时用于安全公司用途个人用途。

    By employing an embedded hypervisor on a smart phone, the single device can be for secure corporate use and for personal use by segregating the two use models in separate containers (VMs).

    youdao

  • 注意JEE安全模型web容器ejb容器支持声明安全授权以及编程安全

    Note that the JEE security model supports declarative security authorization as well as programmatic security for both Web containers and EJB containers.

    youdao

  • 单元住宅火灾为例,讨论了火灾模型火灾安全分析中对几种情况下的火灾应用

    The paper discusses the application of fire model in the fire safety analysis under several different fire situations.

    youdao

  • 本文通信系统一类直接传输信息传输模型进行了安全可靠性设计

    This paper designs security and reliability on a type of information direct transmission model in communication systems.

    youdao

  • 本文建立流量条件分布系统安全计算模型分析了系统的安全性随空中流量增长而变化的规律。

    In this paper, we established a security calculation model for the decentralized system under high traffic flow and analyzed the change of system security with the change of traffic flow.

    youdao

  • 离心机受力分析基础上,建立离心机力学计算模型吊轴的弯扭组合下的疲劳断裂安全作了分析计算。

    This article establish the mechanics model of pendent axis of tube style centrifugal machine, analysis and calculate the fatigue and fracture safety property of pendent axis.

    youdao

  • 本文构建了一种SAN存储网络的安全认证模型利用SRP机制实现了分布数据存储的认证,有效确保了数据安全一致性

    This paper constructed a security authentication mode in IP SAN, realized authentication in distributed data storage using SRP, and assured the security and integrity of data.

    youdao

  • 首先在分析嵌入实时数据库安全要求基础给出了一个安全控制模型

    This passage bulids a secure control model with three layers on the ERTDB security requirements firstly, and then proposes a secure optimistic concurrency control strategy.

    youdao

  • 针对P 2 P网络应用环境特点,提出一种分布式安全访问控制模型

    We design a distributed access control model according to the character of the P2P networks.

    youdao

  • 分析光电互感器性能基础上,提出了针对系统电流进行高精度安全测量光纤光栅电流互感器模型

    As analyzing the property of optical transformer, a FBG current sensor model is projected for measuring big current safely and in high precision.

    youdao

  • 针对目前网格中的社区授权服务(CAS)推模型存在某些安全问题提出了一种拉模型

    In allusion to some questions existed in current community authorization service (CAS) pushing-model, a pulling-model is proposed.

    youdao

  • 提出了一种基于安全从属关系的分布网络入侵检测模型

    In this paper a new distributed network intrusion detection model is presented.

    youdao

  • 给出了构件安全描述模型基础上,提出了基于安全威胁模型分布构件集成方法给出了一个实例

    And then, a way about distributed components assembling based on security menace modular is put forward, an example is given.

    youdao

  • 针对分布环境下数据分发管理问题智能卡口令作为身份认证与密钥交换的基础,设计一个分布数据传输安全模型

    To solve the problem of data distribution and management in the distributed environment, this paper proposes a secure communication model based on smart card and password authentication.

    youdao

  • 提出一种采用树形层次结构分布网络安全系统管理模型

    A management model of distributed network security system with tree-like hierarchical structure was introduced.

    youdao

  • 本文建立分布系统安全计算模型分析系统的安全性随空中流量的增长而变化的规律。

    In this paper we establish a security calculation model for decentralized system and analyze the change of system security with the change of traffic flow.

    youdao

  • 路基箱大型履带起重机的重要配件,为了保障安全工作应当使用合理计算模型对其进行力学性能分析。

    As an indispensable accessory, welded grillage slabs should be analyzed with a reasonable and practical calculation model to guarantee the safe operation.

    youdao

  • 模型解决了传统基于角色访问控制中的动态适应性差最小权限约束假象问题,用于分布工作流管理系统提高安全实用性

    This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.

    youdao

  • 现有网格安全体系GSI主要是通过公钥体系建立其上的分布信任模型来建立与维护虚拟组织内部安全策略空间

    Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.

    youdao

  • 现有网格安全体系GSI主要是通过公钥体系建立其上的分布信任模型来建立与维护虚拟组织内部安全策略空间

    Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定