• Unlike customization, which we will discuss in a minute, security is based on policies created by system administrators to enforce corporate and departmental defined access controls.

    自定义不同,我们立即讨论安全性安全性系统管理员创建的,用于执行企业部门定义访问控制。

    youdao

  • Now we will explain the method of how to create dynamic reporting based on Role based security by using one of our sample packages, "Great Outdoors Warehouse". (Figure 2).

    下面我们使用我们一个样例Great Out doorsWarehouse”展示如何根据基于角色安全性创建动态报告(见图2)。

    youdao

  • We think that we can provide a much cleaner, more powerful solution, similar to the CSIV2 model based on the idea of security assertions.

    我们认为,我们可以提供更简洁、功能强大解决方案,这种方案类似基于安全断言思想CSIV 2模型

    youdao

  • Based on our systemic model of information security, we design an electronic seal system.

    基于我们提出信息安全模型设计电子印章系统

    youdao

  • Third, we should maintain international strategic balance and stability, and achieve security for all based on mutual respect and equal treatment of the legitimate security interests of all parties.

    第三维护国际战略平衡稳定相互尊重和平对待各方合理安全利益基础上,实现各国普遍安全。

    youdao

  • Based on our systemic model of information security, we design and implement a secure E-government information system.

    基于我们提出信息安全模型设计实现了一个基于该模型的电子政务信息安全系统

    youdao

  • We design a NAS security system based on NAS character, This paper introduces the design and implement of application encryption arithmetic.

    我们根据网存储特点设计一个附网存储安全系统本文重点介绍应用级加密算法的设计实现

    youdao

  • Based on the research of Ethernet security switch technology, we partitioned the security switch to several function modules, and implemented an Ethernet security switch prototype.

    前面研究以太网安全交换技术基础上,我们安全交换机进行功能模块划分实现了一个以太网安全交换的原型系统

    youdao

  • The security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding.

    将该安全模式计算机病毒检测进行了应用,实现了一个简单基于二进制编码的计算机病毒检测模拟系统。

    youdao

  • In this paper, we propose a new ring signature and a new proxy ring signature, which are based on bilinear pairings. Also, we analysis the security of new schemes.

    文章提出了一种新的签名方案代理环签名方案,都是基于线性对的,分析方案安全性

    youdao

  • Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.

    然后介绍了现阶段安全扫描软件所采用安全扫描技术,介绍远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。

    youdao

  • In this paper, we propose an ID-based designated confirmer signature scheme based on the bilinear pairings, and analyze its security.

    利用椭圆曲线上线性对,构造基于身份的指定确认签名方案安全性进行了分析

    youdao

  • Thesis researches how to put together SSL and database security, and put forward a database security proxy model. Based on all the work, we developed and realized a simple database security proxy.

    本文研究如何SSL数据库安全有机地结合起来提出基于SSL的数据库安全代理模型,并此基础上设计实现了一个简单的数据库安全代理。

    youdao

  • In order to manage the security system efficiently, we furthermore present a command line interface based on command tree technique.

    此外为了高效管理安全系统我们还为安全系统提供基于命令技术的命令界面

    youdao

  • Based on the inspection of the new factory, we designed a powerful and advanced security system which is based on digital network technology.

    本文通过厂区实地考察设计了一套基于数字网络技术功能强大技术先进安全防范系统

    youdao

  • In this paper we discuss the problems of authentication in traditional electronic commerce and then give an security mechanism based on smart CARDS.

    本文首先讨论传统电子商务认证面临问题然后给出基于智能卡安全认证机制

    youdao

  • In this paper, based on CORBA transaction service and security service, we design an online exchange application.

    文中基于CORBA事务服务安全服务构建一个网上交易应用

    youdao

  • In this paper, we present a new signature scheme with message recovery and the security of the scheme is based on both factorization and discrete logarithms.

    本文设计一种新的具备消息自动恢复特性数字签名方案,这种方案的安全性同时建立因子分解离散对数之上,对这种方案进行了安全性分析。

    youdao

  • In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan.

    为了增强水印信号安全性采用基于混沌平面的水印加密算法。

    youdao

  • In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.

    本文通过CORBA中间件技术实现基于策略安全信息系统从而解决棘手问题。

    youdao

  • In this paper, we identify eight application-level security architectures based on the following three elements: Virtual Machine, Control Set, and Distribution Style.

    本文基于三个因素虚拟控制以及分发类型迄今为止的应用安全结构分为八种

    youdao

  • We present a new anti-counterfeiting technology of social security card based on UGM and digital watermarking.

    提出了一基于UGM模型数字水印社保防伪技术

    youdao

  • Based on our practice on graduate students' elective course of cryptography, we probe into its teaching organization and information security education in this paper.

    本文根据笔者面向计算机专业硕士生开设密码学选修课实践探讨了密码学课程教学组织信息安全教育

    youdao

  • As for the method for security investment fund appraisal, based on the quantitative analysis, we also should pay attention to the application of qualitative analysis.

    基金评价运用方法上,考虑国内情况,在定量方法的基础注重定性方法的运用。

    youdao

  • Another one lies on that we take the Softswitch billing security issues into account, proposing a SIP-based Softswitch billing security mechanism.

    一点在于考虑交换计费安全问题提出了一个基于SIP的软交换计费安全机制

    youdao

  • Based on the security, the source, characteristics, quality "concept, we have a fruit like logo design to Easyline, Easyline to represent the green fresh life of people."

    基于安全源头的、特色的、质优的”的理念我们为宜联佳设计一个水果状的标志代表宜联佳带给人们绿色新鲜生活

    youdao

  • Aiming at ensuring multimedia information security, we discuss the hiding technology for digital audio based on amalgamation. A hiding method is presented.

    针对近年兴起的多媒体信息安全问题讨论数字声音文件隐藏技术,给出一种简便易行的隐藏方法

    youdao

  • Based on the above, we analyzed the corporate performance influence mechanism performed by Security investment fund's share holding.

    基金持股上市公司治理及其公司绩效关系机理进行了分析

    youdao

  • Based on the above, we analyzed the corporate performance influence mechanism performed by Security investment fund's share holding.

    基金持股上市公司治理及其公司绩效关系机理进行了分析

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定