Based on our systemic model of information security, we design an electronic seal system.
基于我们提出的信息安全模型,设计了电子印章系统。
This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.
文中介绍了信息融合的概念和功能模型,以及安全审计系统的组成和功能。
Based on our systemic model of information security, we design and implement a secure E-government information system.
基于我们提出的信息安全模型,设计并实现了一个基于该模型的电子政务信息安全系统。
Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.
数据完整性是信息系统的安全目标之一,该文描述了一个时间相关的数据库管理系统的完整性策略模型。
PKI is the latest information security technology in the world, and trust model is very important in PKI system.
PKI是目前国际上研究最热的信息安全技术。信任模型在PKI体系中占有重要地位。
The information system based on this model can provide high-level security service.
试验表明基于该模型的信息系统可提供高水平的安全服务。
The security model is the core content in the trusted information system and the key field of the trusted computing research.
安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域。
The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.
论述了信息安全基础:安全标准,安全表述模型,网络安全体系结构:几种典型的安全技术。
Security model need the feature attributes of the protected information system.
安全模型必须考虑信息系统的特征信息。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
Methods: security telemedicine system model was constructed with theoretic analysis according to each security request of medical information.
方法针对医疗信息的各项安全要求进行理论分析,构建安全远程医疗系统模型结果。
Analyzed and discussed in this paper are two survivable system models based on information redundant partition technology-high reliability model and high security model.
分析和讨论了基于信息冗余分散的两种可存活系统模型——高可靠和高安全模型。
Then, after SSE-CMM is explained, a risk-analysis-centric model of information system security engineering is established using system engineering theory.
在充分研究SSE CMM模型的基础上,采用系统工程的思想,建立了以风险分析为中心的信息系统安全生命期模型。
In view of resource particularity in wartime information systems of blood security organizations, binary system coding mode and coarse granularity parallel model were adopted.
考虑到血液保障组织系统系统中资源的特殊性,编码方式采用二进制编码,并行模型为粗粒度并行模型。
So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.
因此,本文主要分为两个重要的组成部分:信息系统的风险分析和管理过程及基于RBAC的安全模型设计。
Being a new hot spot in the research of information security, the streaming media based information hiding is still lacking theoretical system model and standardization.
流媒体信息隐藏是当前信息安全技术领域的研究热点,但基于流媒体的隐蔽通信技术还缺少系统模型和标准。
Unit 2: This unit includes chapter 3 and chapter 4. The security model has been designed by the studies on the security of the data and information system.
第二部分,通过对数据及信息系统安全的探讨得出列车运行图信息系统的安全模型,包括第三、四章。
Chapter 4 gives the security model of the TDIS by the studies on security strategies of information system.
第四章通过信息系统开发的安全策略的研究并结合第三章得到了列车运行图信息系统安全模型。
The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.
在网络拓扑上主要采用DMZ管理区模式,通过SSL认证系统加强网络信息安全防护。
The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.
在网络拓扑上主要采用DMZ管理区模式,通过SSL认证系统加强网络信息安全防护。
应用推荐