用户安全模型使用消息鉴别码、加密和时间戳保护网管消息的传输安全。
Through MAC, encryption and timestamp, USM protects management messages from communication threats.
然后,用户可以在安全页面和不安全页面之间导航而不会破坏安全模型。
Then, users could navigate between secured and non-secured pages without breaking the security model.
如果你建立的模型对于预测用户请求的延时非常有效,它不一定能帮你发现安全漏洞。
If you build a model of your system that is useful for predicting latency of user requests, it probably won't help you discover security holes.
IBMCognos安全模型允许将用户作为角色和组的成员来进行管理。
The IBM Cognos security model allows you to manage users as member of roles and groups.
分析安全需要并设置角色模型(定义用户类型)。
Analyze the security requirements and set up role models (define user types).
通过使用以下安全模型,您将拥有合适的工具来创建具有安全性的安全的应用程序,而且使用此应用程序的用户不会感觉麻烦。
By using the following security model, you will have the right tools in your belt to create a safe application with security in place that isn't cumbersome for users.
组织需要从分层的安全模型转到全局安全模型上来,其中包含了业务流程、用户与系统,他们共同作为整个安全响应模型的组成部分。
The organizations have to move from a layer specific security model to a holistic one which includes business processes, users and systems as part of the overall security response model.
文中还介绍了DB 2UDB安全模型,包括用户身份验证、用户和组授权以及超级用户。
It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.
区分上述两类用户的安全和访问控制模型。
A security and access control model that distinguishes between these two classes of users.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
CubeServer重新加载安全性后,它将根据安全模型中的策略对用户授权。
After you tell the Cube Server to reload security, it will authorize users according to the policies in your security model.
我们需要自定义通过w3概要分析cookie来识别用户的安全代码,并通过WebSpherePortal安全模型来集成。
We needed to customize the security code that identified users by a w3 profiling cookie to integrate it with the WebSphere Portal security model.
本系列的第1部分介绍了DB 2安全性模型,并讨论了用户和组帐户如何与DB 2 Universal Database (udb)交互。
Part 1 of this article series presents the DB2 security model, and discusses how user and group accounts interact with DB2 for Linux, UNIX, and Windows (DB2).
要使CubeServer在用户执行查询时实施安全模型,需要向角色添加用户。
For the Cube Server to enforce your security model when users execute queries, you need to add users to roles.
重要的是要理解当前安全模型、用户角色、权限和应用程序功能。
It's important to understand the current security model, user roles, permissions and capabilities of the application. The following points helps in evaluating the maturity of security architecture.
本文探讨了CTI技术在MIS中的一些应用问题,重点是用户诉求模型下的信息安全设计、信息流设计及软件设计。
Based on the user request model, several problems about CTI embedded in MIS, such as security and flow of information, are discussed in this paper.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
可信网络架构安全模型是针对用户现有的网络安全资源进行有效整合和管理的。
The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.
该模型方便了管理员的权限管理,适合用户较多,安全层次比较复杂的多级关系数据库系统。
The integrated model can simplify administration of privileges, and is appropriate for multilevel relation database system which has many users or complex security levels.
此安全模型保证合法的用户可以访问网格资源;
This security grid model ensures that the legal user can access grid resouces;
在网络节点可信的安全假设下,提出一种面向用户的网络层安全通信模型。
This paper introduces a user-oriented secure communication model implemented in network layer for two trusted network nodes.
安全分析表明,在解决用户跨步问题的前提下,没有降低模型的安全性。
Through the security analysis, the model has settled users' bestriding problem yet still achieved security property.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
从风险与安全的角度提出一种新的用户行为决策模型,将服务提供者和用户作为非合作博弈的对立方,在不完全信息静态博弈的基础上研究博弈参与者之间的交互行为。
The service provider and the user are regarded as the two players in the non-cooperation games, and their interactions are analyzed based on static games model with incomplete information.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
基于用户的安全模型USEC ?
该安全机制能有效提高访问控制模型对冒充用户访问的检测及控制能力。
This security mechanism can effectively improve the ability of access control model to detect and control a pseudo-user.
论文工作重点解决了典型电子政务模型中安全信息交换、网络信任域管理、用户授权访问、责任认定服务等问题。
This paper focus on the exchange of security information, management of network trust domain, authority control and duty confirmation.
论文工作重点解决了典型电子政务模型中安全信息交换、网络信任域管理、用户授权访问、责任认定服务等问题。
This paper focus on the exchange of security information, management of network trust domain, authority control and duty confirmation.
应用推荐