All these govern the overall security model of the system.
所有这些内容控制着系统的总体安全模型。
When planning the security model for your application, you must address both elements to make sure your system has a sufficient level of security.
在为应用程序规划安全性模型时,必须处理好这两个元素以确保系统具有足够的安全性。
If you build a model of your system that is useful for predicting latency of user requests, it probably won't help you discover security holes.
如果你建立的模型对于预测用户请求的延时非常有效,它不一定能帮你发现安全漏洞。
Based on our systemic model of information security, we design an electronic seal system.
基于我们提出的信息安全模型,设计了电子印章系统。
With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.
文中介绍了信息融合的概念和功能模型,以及安全审计系统的组成和功能。
Based on our systemic model of information security, we design and implement a secure E-government information system.
基于我们提出的信息安全模型,设计并实现了一个基于该模型的电子政务信息安全系统。
Using this model, we can realize both the requirements of the static security policy of the system and the dynamic requirements of the real world.
该模型既实现了系统中静态的信息安全访问要求,又实现了权限管理中动态的变化要求。
The security model of the proxy server based on PDRR consists of protection system, detection system, response system, recovery system and expert system.
基于防御-检测-响应-恢复的代理服务器安全模型由防御、检测系统、响应系统、恢复系统和专家系统组成。
With function of protection ring and security kernel, a novel model for enhancing security of operating system is proposed.
利用保护环和安全内核的功能,提出了一种新的增强操作系统安全性的模型。
This paper presents a dynamic defense model of network security, based on which a prototype system is implemented.
文章提出了一个网络安全防护的动态模型,并基于该模型实现了系统原型。
In view of resource particularity in wartime information systems of blood security organizations, binary system coding mode and coarse granularity parallel model were adopted.
考虑到血液保障组织系统系统中资源的特殊性,编码方式采用二进制编码,并行模型为粗粒度并行模型。
Based on the in-depth research of network communication and security technologies, this paper builds up a architectural model of cross-area logistics management system.
论文在深入研究网络通信技术和安全技术的基础上,构建了跨区域物流管理系统的框架模型。
Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.
数据完整性是信息系统的安全目标之一,该文描述了一个时间相关的数据库管理系统的完整性策略模型。
On the basis of the P2DR network security model, the paper discusses design and implementation of the Inner Network Behaviors Monitor & Audit System (for short NBAMS).
本文在P2DR(策略、防护、检测、响应)安全模型的基础上,详细的论述了内部网行为监管审计系统的设计和实现。
In Chapter 4, the design of the data exchange system of Collaborative Commerce Platform based on the security model is discussed.
第4章主要介绍了基于该安全模型的协同商务平台数据交换系统的设计。
Based on the concept of AOP, introduced the measures how to enhance the Decision-Supported System (DSS) model of the security.
介绍基于面向方面的编程(AOP)思想和增强决策支持系统(DSS)模型安全的策略。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
Security model is based on system security requirements which provide specification for system security requirements and logic structure of security architecture.
安全模型是基于系统安全需求建立的模型,用于描述系统的安全需求和安全体系的逻辑构成。
A power system probabilistic dispatching model of coordinating security and economy has been established in this paper.
该文构建电力系统安全与经济相协调的概率调度模型。
With the popularity of EFI, this model has a good prospect in achieving security on computer system.
随着EFI的普及,这将在实现安全计算机系统上具有较好的应用前景。
Security model need the feature attributes of the protected information system.
安全模型必须考虑信息系统的特征信息。
Methods: security telemedicine system model was constructed with theoretic analysis according to each security request of medical information.
方法针对医疗信息的各项安全要求进行理论分析,构建安全远程医疗系统模型结果。
The security analysis of the network file service system is able to validate the security of model.
通过对网络文件服务系统的安全性分析,验证了该模型的安全性。
In addition, we analyse the security of the whole network system integrating the five-layer model of network security mechanism, and put forward the corresponding tactics for every layer.
另外,结合网络安全机制五层模型对整体网络系统的安全进行分析,并针对各层的安全性提出相应的策略。
In allusion to the deficiency of image detecting ability of current network security system, anintelligent network security system model is developed based on image content detecting.
针对目前网络安全系统对于图像信息监测能力不足的问题,提出了一种基于图像内容的智能网络安全监测系统模型。
In this paper, we established a security calculation model for the decentralized system under high traffic flow and analyzed the change of system security with the change of traffic flow.
本文建立了大流量条件下分布式系统的安全性计算模型,分析了系统的安全性随空中流量的增长而变化的规律。
In this paper, we established a security calculation model for the decentralized system under high traffic flow and analyzed the change of system security with the change of traffic flow.
本文建立了大流量条件下分布式系统的安全性计算模型,分析了系统的安全性随空中流量的增长而变化的规律。
应用推荐