Unlike customization, which we will discuss in a minute, security is based on policies created by system administrators to enforce corporate and departmental defined access controls.
与自定义不同,我们将立即讨论安全性。安全性是由系统管理员创建的,用于执行企业或部门定义的访问控制。
Now we will explain the method of how to create dynamic reporting based on Role based security by using one of our sample packages, "Great Outdoors Warehouse". (Figure 2).
下面,我们将使用我们的一个样例包“Great Out doorsWarehouse”展示如何根据基于角色的安全性创建动态报告(见图2)。
We think that we can provide a much cleaner, more powerful solution, similar to the CSIV2 model based on the idea of security assertions.
我们认为,我们可以提供更简洁、功能更强大的解决方案,这种方案类似于基于安全断言思想的CSIV 2模型。
Based on our systemic model of information security, we design an electronic seal system.
基于我们提出的信息安全模型,设计了电子印章系统。
Third, we should maintain international strategic balance and stability, and achieve security for all based on mutual respect and equal treatment of the legitimate security interests of all parties.
第三,应维护国际战略平衡与稳定,在相互尊重和平等对待各方合理安全利益的基础上,实现各国普遍安全。
Based on our systemic model of information security, we design and implement a secure E-government information system.
基于我们提出的信息安全模型,设计并实现了一个基于该模型的电子政务信息安全系统。
We design a NAS security system based on NAS character, This paper introduces the design and implement of application encryption arithmetic.
我们根据附网存储的特点,设计了一个附网存储安全系统,本文重点介绍其应用级加密算法的设计与实现。
Based on the research of Ethernet security switch technology, we partitioned the security switch to several function modules, and implemented an Ethernet security switch prototype.
在前面研究了以太网安全交换技术的基础上,我们对安全交换机进行功能模块划分,实现了一个以太网安全交换的原型系统。
The security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding.
将该安全模式在计算机病毒检测中进行了应用,实现了一个简单的基于二进制编码的计算机病毒检测模拟系统。
In this paper, we propose a new ring signature and a new proxy ring signature, which are based on bilinear pairings. Also, we analysis the security of new schemes.
文章提出了一种新的环签名方案和代理环签名方案,都是基于双线性对的,并分析了新方案的安全性。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
In this paper, we propose an ID-based designated confirmer signature scheme based on the bilinear pairings, and analyze its security.
利用椭圆曲线上的双线性对,构造基于身份的指定确认者签名方案,并对其安全性进行了分析。
Thesis researches how to put together SSL and database security, and put forward a database security proxy model. Based on all the work, we developed and realized a simple database security proxy.
本文研究如何将SSL与数据库安全有机地结合起来,提出了基于SSL的数据库安全代理模型,并在此基础上设计实现了一个简单的数据库安全代理。
In order to manage the security system efficiently, we furthermore present a command line interface based on command tree technique.
此外,为了高效管理安全系统,我们还为安全系统提供基于命令树技术的命令行界面。
Based on the inspection of the new factory, we designed a powerful and advanced security system which is based on digital network technology.
本文通过对新厂区的实地考察,设计了一套基于数字网络技术的功能强大、技术先进的安全防范系统。
In this paper we discuss the problems of authentication in traditional electronic commerce and then give an security mechanism based on smart CARDS.
本文首先讨论了传统电子商务认证面临的问题,然后给出了基于智能卡的安全认证机制。
In this paper, based on CORBA transaction service and security service, we design an online exchange application.
文中,基于CORBA的事务服务和安全服务构建了一个网上交易的应用。
In this paper, we present a new signature scheme with message recovery and the security of the scheme is based on both factorization and discrete logarithms.
本文设计一种新的具备消息自动恢复特性的数字签名方案,这种方案的安全性同时建立在因子分解和离散对数之上,并对这种方案进行了安全性分析。
In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan.
为了增强水印信号的安全性,采用了基于混沌和位平面的水印加密算法。
In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.
本文通过CORBA中间件技术,来实现基于策略的安全信息系统,从而解决这一棘手问题。
In this paper, we identify eight application-level security architectures based on the following three elements: Virtual Machine, Control Set, and Distribution Style.
本文基于三个因素:虚拟机、控制集以及分发类型,把迄今为止的应用级安全结构分为八种。
We present a new anti-counterfeiting technology of social security card based on UGM and digital watermarking.
提出了一种基于UGM模型和数字水印的社保卡防伪技术。
Based on our practice on graduate students' elective course of cryptography, we probe into its teaching organization and information security education in this paper.
本文根据笔者面向计算机专业硕士生开设密码学选修课的实践,探讨了密码学课程的教学组织和信息安全教育。
As for the method for security investment fund appraisal, based on the quantitative analysis, we also should pay attention to the application of qualitative analysis.
在基金评价运用的方法上,考虑到国内的情况,在定量方法的基础上,也要注重定性方法的运用。
Another one lies on that we take the Softswitch billing security issues into account, proposing a SIP-based Softswitch billing security mechanism.
另一点在于考虑了软交换计费安全的问题,提出了一个基于SIP的软交换计费安全机制。
Based on the security, the source, characteristics, quality "concept, we have a fruit like logo design to Easyline, Easyline to represent the green fresh life of people."
基于“安全的、源头的、特色的、质优的”的理念,我们为宜联佳设计了一个水果状的标志,代表宜联佳带给人们的绿色新鲜生活。
Aiming at ensuring multimedia information security, we discuss the hiding technology for digital audio based on amalgamation. A hiding method is presented.
针对近年来兴起的多媒体信息安全问题,讨论了数字声音文件的隐藏技术,给出一种简便易行的隐藏方法。
Based on the above, we analyzed the corporate performance influence mechanism performed by Security investment fund's share holding.
对基金持股与上市公司治理及其公司绩效关系的机理进行了分析。
Based on the above, we analyzed the corporate performance influence mechanism performed by Security investment fund's share holding.
对基金持股与上市公司治理及其公司绩效关系的机理进行了分析。
应用推荐