In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.
图2的中心展示的是Tivoli的WebSEAL产品,该产品充当代理的角色并提供安全机制来控制对网络中的文档以及Web对象的访问。
Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.
可以通过策略实现安全措施(包括对部分网络的访问)或控制服务质量。
Such issues constitute a control challenge because tried and tested network-level security controls might not work in a given cloud environment.
这些问题构成了一个控制的挑战,因为基于尝试和测试的网络级安全控制在一个给定的云环境中可能无法正常工作。
Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.
入网访问控制是保证网络资源不被非法使用, 是网络安全防范和保护的主要策略。
All in all, this constitutes a control challenge of insufficient network-based controls because tried-and-tested network-level security controls might not work in a given cloud environment.
总而言之,这形成了一个控制上的问题,即不充分的基于网络的控制,因为基于尝试与测试的网络级别安全控制可能在某些云计算环境下无法工作。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
To manage and control numerous, various, complicated, and dynamic security hardware, security applications and security events in the large-scope network is named network security management (NSM).
网络安全管理即指对大规模网络中数量众多、种类繁杂、动态变化的安全硬件、安全应用、安全事件的管理和控制。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
An physical approach of network security based on PCI bus is proposed, the design scheme of the core component, PCI control card, is introduced, and realization of some key technologies is described.
提出了基于PCI总线网络安全的一种物理实现方法,详细介绍了其核心部件PCI控制板卡的设计方案,并描述了其中几个关键技术的实现。
Finally, a test platform is built to test the prototype system in terms of remote control, network security and network parameter configuration.
本文最后搭建了一个测试平台,从远程控制、网络安全性和参数配置三方面对原型系统进行测试。
Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.
访问控制是网络安全的一个重要组成部分,在保障电子政务信息的完整性、保密性和可用性方面发挥着重要作用。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
In order to prevent and control illegal and harmful information to spread on Internet, it has become significant problem in network security field to filter the information spreading on Internet.
为了防止和控制非法,有害信息进行传播,对网络上传播的信息进行内容过滤已成为目前网络安全研究的重点问题。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
Operation results show that with this network, on-site equipment control and management becomes more convenient, which provides customers with an actual user-terminal class control of high security.
运行结果表明,该网络能更好地进行现场设备控制和管理,为实现真正用户终端级的、高安全性的控制提供了一个新的解决方案。
Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.
访问控制策略是网络安全策略的重要组成部分,基于角色访问控制策略以其方便有效的特点日益受到人们的关注。
P2P model on the IPV6 can solve problem of security and control in the network finally.
IPV 6上的P 2 P模式能最终解决网络上的安全管理问题。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
This management can improve the running quality of VOD system, enhance the security of network, increase the time of normal running and control the running costing.
加强完善了网络的安全性,增加了网络的无故障运行时间;简化了多厂商混合网络的管理,并且能够有效地控制网上运行成本。
However, P2P network is short of centralized control so that the security in P2P network is faced with much challenge.
但是,由于P2 P网络缺乏集中控制,使得P 2 P网络的安全成为一个突出的问题。
Industrial control network is approaching to integrate with information network, consequently, information security problems along with them emerge rapidly and largely.
工业控制网络正与信息网络走向融合,随之而来的信息安全问题愈加突出。
The use of the multiple functions of switch in access-control can realize the distribution security system, and implement the security management for the network and the users.
利用中心交换机的多种访问控制功能,可构建一个分布式的网络安全交换体系,以实现对网络和用户接入的安全管理。
How to provide access control function for CSCD based on P2P network to make the cooperative design more security, it has become a key question studied at present.
如何给基于P 2 P网络的协同设计提供合适的访问控制功能,使人们可以更安全的进行设计活动,已经成为一个急待解决的问题。
To guarantee access security in network collaborative enterprise modeling systems, establishing access control function is in demand.
为了保证在网络化的协同企业建模系统中对模型的安全访问,需要建立一套有效的访问控制机制。
The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.
它是保证网络安全的核心策略之一,也是信息安全技术的重要组成部分。
This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.
另一方面是对网络系统实施有效的安全管理,做好网络数据的备份和网络用户的管理两项工作。
The research shows that extension set and correlation degree analysis is the utility method of network security analysis and control.
研究表明,可拓集与关联度分析是网络安全分析与控制的有效工具。
In modern power systems, energy control centers play a vital role in guaranteeing the security and optimal operation of a power network system.
在现代电力系统中,能量控制中心在保证电网安全和优化运行的过程中起着关键的作用。
Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.
访问控制技术是网络安全的一项基本技术,主要包括基于角色的访问控制和基于任务的访问控制等技术。
Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.
访问控制技术是网络安全的一项基本技术,主要包括基于角色的访问控制和基于任务的访问控制等技术。
应用推荐