• In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.

    2中心展示TivoliWebSEAL产品产品充当代理角色提供安全机制控制网络中的文档以及Web对象访问

    youdao

  • Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.

    可以通过策略实现安全措施(包括部分网络访问)控制服务质量

    youdao

  • Such issues constitute a control challenge because tried and tested network-level security controls might not work in a given cloud environment.

    这些问题构成了控制挑战因为基于尝试测试的网络安全控制一个给定环境中可能无法正常工作

    youdao

  • Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.

    入网访问控制保证网络资源被非法使用, 是网络安全防范保护主要策略

    youdao

  • All in all, this constitutes a control challenge of insufficient network-based controls because tried-and-tested network-level security controls might not work in a given cloud environment.

    而言之,形成了一个控制上的问题,即不充分基于网络控制因为基于尝试与测试的网络级别安全控制可能某些云计算环境下无法工作

    youdao

  • Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.

    网络安全目前信息系统应用重要研究方向如何确定用户身份控制用户对信息资源的访问,是其中的一个重要问题。

    youdao

  • To manage and control numerous, various, complicated, and dynamic security hardware, security applications and security events in the large-scope network is named network security management (NSM).

    网络安全管理即指大规模网络数量众多、种类繁杂动态变化的安全硬件、安全应用、安全事件管理控制

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

  • An physical approach of network security based on PCI bus is proposed, the design scheme of the core component, PCI control card, is introduced, and realization of some key technologies is described.

    提出基于PCI总线网络安全一种物理实现方法详细介绍了核心部件PCI控制板卡设计方案描述了其中几个关键技术实现

    youdao

  • Finally, a test platform is built to test the prototype system in terms of remote control, network security and network parameter configuration.

    本文最后搭建了一个测试平台远程控制网络安全性参数配置三方面对原型系统进行测试。

    youdao

  • Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.

    访问控制网络安全一个重要组成部分,保障电子政务信息完整性保密性可用性方面发挥着重要作用。

    youdao

  • The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.

    通过设置密码蓝牙技术安全机制提供信息家电网络远程控制系统的安全保障

    youdao

  • In order to prevent and control illegal and harmful information to spread on Internet, it has become significant problem in network security field to filter the information spreading on Internet.

    为了防止控制非法有害信息进行传播,对网络传播信息进行内容过滤成为目前网络安全研究的重点问题

    youdao

  • The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.

    主要介绍网络安全准入控制系统组成相关技术技术铁路信息系统中如何应用加以探讨

    youdao

  • Operation results show that with this network, on-site equipment control and management becomes more convenient, which provides customers with an actual user-terminal class control of high security.

    运行结果表明网络能更好地进行现场设备控制管理实现真正用户终端安全性的控制提供一个新的解决方案。

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • P2P model on the IPV6 can solve problem of security and control in the network finally.

    IPV 6P 2 P模式最终解决网络安全管理问题

    youdao

  • Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.

    设置用户存取权限控制冗余备份恢复网络安全等多种安全策略共同建立有机的安全体系

    youdao

  • This management can improve the running quality of VOD system, enhance the security of network, increase the time of normal running and control the running costing.

    加强完善网络安全性增加了网络的无故障运行时间;简化了多厂商混合网络的管理并且能够有效地控制网上运行成本

    youdao

  • However, P2P network is short of centralized control so that the security in P2P network is faced with much challenge.

    但是,由于P2 P网络缺乏集中控制,使得P 2 P网络安全成为一个突出的问题

    youdao

  • Industrial control network is approaching to integrate with information network, consequently, information security problems along with them emerge rapidly and largely.

    工业控制网络信息网络走向融合随之而来的信息安全问题愈加突出。

    youdao

  • The use of the multiple functions of switch in access-control can realize the distribution security system, and implement the security management for the network and the users.

    利用中心交换机多种访问控制功能构建一个分布式网络安全交换体系实现网络用户接入的安全管理

    youdao

  • How to provide access control function for CSCD based on P2P network to make the cooperative design more security, it has become a key question studied at present.

    如何基于P 2 P网络协同设计提供合适的访问控制功能使人们可以安全的进行设计活动,已经成为一个急待解决问题

    youdao

  • To guarantee access security in network collaborative enterprise modeling systems, establishing access control function is in demand.

    为了保证网络化协同企业建模系统对模型的安全访问需要建立一套有效的访问控制机制

    youdao

  • The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.

    保证网络安全核心策略之一也是信息安全技术的重要组成部分。

    youdao

  • This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.

    一方面网络系统实施有效安全管理,做好网络数据备份网络用户的管理项工作。

    youdao

  • The research shows that extension set and correlation degree analysis is the utility method of network security analysis and control.

    研究表明可拓关联度分析网络安全分析与控制有效工具

    youdao

  • In modern power systems, energy control centers play a vital role in guaranteeing the security and optimal operation of a power network system.

    现代电力系统中能量控制中心保证电网安全和优化运行的过程中起关键的作用

    youdao

  • Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.

    访问控制技术网络安全一项基本技术,主要包括基于角色访问控制基于任务的访问控制等技术。

    youdao

  • Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.

    访问控制技术网络安全一项基本技术,主要包括基于角色访问控制基于任务的访问控制等技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定