• For a given application domain, the host can change the default role-based security policy and set a default security principal.

    对于给定应用程序宿主更改默认基于角色安全性策略设置默认安全主体

    youdao

  • The modern enterprise network security protection common security issues and their implications, explore ways to solve these problems of network security, provides network-based security policy.

    现代企业网络安全防护常见安全问题及其影响探讨解决这些网络安全问题方法提供了基于网络内部的安全策略

    youdao

  • A typical process of policy based service security management can be divided into five steps and described as follows.

    下面所述一个基于策略服务安全管理典型流程可以分为五大步骤

    youdao

  • Policy based service security management.

    基于策略服务安全性管理

    youdao

  • Therefore the format is largely based on the syntax conventions used in OASIS specifications such as WS-Security Policy.

    因此这种格式主要基于WS-Security PolicyOASIS规范使用语法惯例

    youdao

  • The choice should really be made based on the desired security policy and whether the enterprise is prepared to set up and maintain a certificate revocation list.

    实际上证书类型选择应该基于理想的安全策略企业是否准备建立维护一个证书撤销列表

    youdao

  • Instead of encrypting everything with the same key strength regardless of needs, rich clients can establish a comprehensive differentiating security policy based on the content.

    客户机可以根据内容建立全面分级安全性策略而不是无论是否需要相同密钥强度加密所有内容。

    youdao

  • For example, a service can be selected from among a list of functionally equivalent services, based on its support for a specific privacy policy or the security assurances that it provides.

    举例来说,根据服务具体隐私策略支持着服务提供安全保证可以从功能上等价服务列表中选出服务。

    youdao

  • At the core of all SOA security is a policy-based infrastructure and management of the policies.

    所有SOA安全核心基于策略的基础设施策略的管理

    youdao

  • As the name implies, a PEP is a point in the security architecture where authentication and authorization rules are enforced, based upon the policy defined in the PDP.

    顾名思义PEP安全体系结构基于PD p定义策略执行身份验证授权规则位置

    youdao

  • Tivoli Access Manager Policy Server: Supports policies definition and security administration based on the policies.

    TivoliAccessManagerPolicyServer支持策略定义基于策略的安全管理

    youdao

  • For companies deploying service Oriented Architecture (SOA) and Web services, TFIM provides policy-based integrated security management for federated Web services.

    对于部署面向服务体系结构Web服务公司TFIM联合Web服务提供基于策略集成安全管理

    youdao

  • Tivoli Access Manager for e-business is a mature product that provides robust, policy-based security to a corporate web environment.

    TivoliAccessManagerfor e-business款成熟产品,能够企业web 环境提供强壮的基于策略安全性

    youdao

  • IBM's SOA Security Expert Dr. Raj Nagaratnam explained in a recent interview that services are based on a trust model where authorization is delegated to a policy layer external to the application.

    IBMSOA安全专家RajNagaratnam博士最近的采访中解释说,服务基于一种信任模型其中将授权委托给应用程序外部的策略

    youdao

  • Secure group communication is based on a consistent security policy.

    安全通信前提是一致的安全策略

    youdao

  • Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全性

    youdao

  • This model based on the multilevel security policy, to increase host security in every aspects.

    模型多级安全策略为基础,全面增强主机安全。

    youdao

  • A dynamic grey temporal system (DGTS) and a grey temporal security policy specification Ianguage (GTSL) based on the dynamic semantics of DGTS are presented in this paper.

    本文详细描述了DGTS,以及基于DGTS动态语义设计的灰色时序安全策略规范语言gtsl

    youdao

  • This thesis focuses on security problems of group communication, and intends to construct a policy-based security management infrastructure for group communication.

    本文主要研究组通信安全管理问题,目标是建立一个基于策略通信安全管理基础结构

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • Based on the evidence, the common language runtime security manager maps the assembly to a code group based on security policy.

    根据证据公共语言运行时安全管理器基于安全策略程序集映射代码

    youdao

  • How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.

    基于此,研究了如何维持策略空间穿越中的安全信息完整性有效性,提出了基于安全信息的动态访问控制算法

    youdao

  • Network policy support includes LAN-based Class of Service and Quality of Service, advanced security and automated network management.

    网络政策支持包括基于LAN服务种类服务质量先进安全性自动的网络管理

    youdao

  • In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.

    本文通过CORBA中间件技术实现基于策略安全信息系统从而解决棘手问题。

    youdao

  • Based on those empirical results, this paper put forward policy recommendations about division of social security burden between state, enterprises and individuals reasonably.

    上述分析基础上,本文提出合理划分国家企业个人方社保负担政策建议

    youdao

  • Furthermore - the security management policy of project document, based on role - security-personnel, is presented to support information communication and security control.

    提出基于角色权限人员项目文档权限分配策略支持信息交流安全控制

    youdao

  • The runtime grants permissions to both assemblies and application domains based on security policy.

    运行时根据安全策略程序应用程序授予权限

    youdao

  • Grants permissions to each assembly that is loaded, based on the permissions requested by the code and on the operations permitted by security policy.

    根据代码要求权限安全策略允许操作加载每个程序集授予权限。

    youdao

  • Intrusion Detection system (IDS) is an activity based network security system. As the logical supplement of usual passive policy, it is the important part of whole security system.

    入侵检测系统(IDS)一种基于主动策略网络安全系统,是对常用被动策略逻辑补偿网络安全系统中的重要组成部分

    youdao

  • Policy description language, which is one of the core parts of the policy-based security management system, is still lack of a common standard.

    作为基于策略安全管理系统核心之一安全策略描述语言至今没有一种业界通用标准

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定