For a given application domain, the host can change the default role-based security policy and set a default security principal.
对于给定应用程序域,宿主可更改默认的基于角色的安全性策略并设置默认安全主体。
The modern enterprise network security protection common security issues and their implications, explore ways to solve these problems of network security, provides network-based security policy.
现代企业网络安全防护常见的安全问题及其影响,探讨解决这些网络安全问题的方法,提供了基于网络内部的安全策略。
A typical process of policy based service security management can be divided into five steps and described as follows.
如下面所述,一个基于策略的服务安全管理的典型流程可以分为五大步骤。
Policy based service security management.
基于策略的服务安全性管理。
Therefore the format is largely based on the syntax conventions used in OASIS specifications such as WS-Security Policy.
因此,这种格式主要基于WS-Security Policy等OASIS规范中使用的语法惯例。
The choice should really be made based on the desired security policy and whether the enterprise is prepared to set up and maintain a certificate revocation list.
实际上,证书类型的选择应该基于理想的安全策略和企业是否准备好建立和维护一个证书撤销列表。
Instead of encrypting everything with the same key strength regardless of needs, rich clients can establish a comprehensive differentiating security policy based on the content.
胖客户机可以根据内容建立全面分级的安全性策略,而不是无论是否需要都以相同的密钥强度加密所有内容。
For example, a service can be selected from among a list of functionally equivalent services, based on its support for a specific privacy policy or the security assurances that it provides.
举例来说,根据服务对具体的隐私策略的支持或着服务提供的安全保证,可以从功能上等价的服务的列表中选出服务。
At the core of all SOA security is a policy-based infrastructure and management of the policies.
所有SOA安全的核心都是基于策略的基础设施和策略的管理。
As the name implies, a PEP is a point in the security architecture where authentication and authorization rules are enforced, based upon the policy defined in the PDP.
顾名思义,PEP是安全体系结构中基于PD p中定义的策略执行身份验证和授权规则的位置。
Tivoli Access Manager Policy Server: Supports policies definition and security administration based on the policies.
TivoliAccessManagerPolicyServer:支持策略定义和基于策略的安全管理。
For companies deploying service Oriented Architecture (SOA) and Web services, TFIM provides policy-based integrated security management for federated Web services.
对于部署面向服务体系结构和Web服务的公司,TFIM为联合Web服务提供基于策略的集成的安全管理。
Tivoli Access Manager for e-business is a mature product that provides robust, policy-based security to a corporate web environment.
TivoliAccessManagerfor e-business是一款成熟的产品,能够为企业web 环境提供强壮的、基于策略的安全性。
IBM's SOA Security Expert Dr. Raj Nagaratnam explained in a recent interview that services are based on a trust model where authorization is delegated to a policy layer external to the application.
IBM的SOA安全专家RajNagaratnam博士在最近的采访中解释说,服务基于一种信任模型,其中将授权委托给应用程序外部的策略层。
Secure group communication is based on a consistent security policy.
安全组通信的前提是一致的安全策略。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
This model based on the multilevel security policy, to increase host security in every aspects.
模型以多级安全策略为基础,以全面增强主机安全。
A dynamic grey temporal system (DGTS) and a grey temporal security policy specification Ianguage (GTSL) based on the dynamic semantics of DGTS are presented in this paper.
本文详细描述了DGTS,以及基于DGTS的动态语义设计的灰色时序安全策略规范语言gtsl。
This thesis focuses on security problems of group communication, and intends to construct a policy-based security management infrastructure for group communication.
本文主要研究组通信的安全管理问题,目标是建立一个基于策略的组通信安全管理基础结构。
Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.
访问控制策略是网络安全策略的重要组成部分,基于角色访问控制策略以其方便有效的特点日益受到人们的关注。
Based on the evidence, the common language runtime security manager maps the assembly to a code group based on security policy.
根据证据,公共语言运行时安全管理器基于安全策略将程序集映射到代码组。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
Network policy support includes LAN-based Class of Service and Quality of Service, advanced security and automated network management.
网络政策支持包括基于LAN的服务种类和服务质量、先进的安全性和自动的网络管理。
In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.
本文通过CORBA中间件技术,来实现基于策略的安全信息系统,从而解决这一棘手问题。
Based on those empirical results, this paper put forward policy recommendations about division of social security burden between state, enterprises and individuals reasonably.
在上述分析基础上,本文提出了合理划分国家、企业、个人三方社保负担的政策建议。
Furthermore - the security management policy of project document, based on role - security-personnel, is presented to support information communication and security control.
提出基于角色权限人员的项目文档权限分配策略,支持了信息交流和安全控制。
The runtime grants permissions to both assemblies and application domains based on security policy.
运行时根据安全策略向程序集和应用程序域授予权限。
Grants permissions to each assembly that is loaded, based on the permissions requested by the code and on the operations permitted by security policy.
根据代码要求的权限和安全策略允许的操作,向加载的每个程序集授予权限。
Intrusion Detection system (IDS) is an activity based network security system. As the logical supplement of usual passive policy, it is the important part of whole security system.
入侵检测系统(IDS)是一种基于主动策略的网络安全系统,是对常用的被动策略的逻辑补偿,是网络安全系统中的重要组成部分。
Policy description language, which is one of the core parts of the policy-based security management system, is still lack of a common standard.
作为基于策略安全管理系统核心之一的安全策略描述语言,至今没有一种业界通用的标准。
应用推荐