• There should be a formal process that includes a security review that determines what permissions an application will be allowed.

    应该配备正式的流程其中应包含安全复查以确定应用程序将被允许使用哪些权限。

    youdao

  • Used BAN logic, the objective and the security of this protocol are proved by formal analysis process.

    采用BAN逻辑协议进行形式化分析表明:协议达到了认证密钥分配目标,具有较强的安全性

    youdao

  • After setting up the idealized protocol model, a process of formal analysis of this protocol is presented and the security is proved theoretically by using the BAN logic.

    通过建立协议理想化模型利用BAN逻辑形式化分析协议,在理论上证明安全性

    youdao

  • This paper presents a formal approach to specify security model based on the theory of finite state machine(FSM) and the concept of communicating sequential process (CSP).

    形式概念分析是从形式背景基本数据形式开始,因此形式背景的规模是影响概念格构造和应用的一个重要因素。

    youdao

  • This paper presents a formal approach to specify security model based on the theory of finite state machine(FSM) and the concept of communicating sequential process (CSP).

    形式概念分析是从形式背景基本数据形式开始,因此形式背景的规模是影响概念格构造和应用的一个重要因素。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定