• Secure access control for services using policies is also provided.

    提供了通过策略实现的服务安全访问控制

    youdao

  • The traditional RBAC model cannot express complicated workflow secure access control constraint.

    传统RBAC访问控制模型已经不能表达复杂工作流安全访问控制约束

    youdao

  • The current secure access control techniques in IP multicast just implemented the access control to multicast receivers.

    目前针对IP安全访问控制问题的解决方案只是实现组播接收者的访问控制。

    youdao

  • It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.

    本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制

    youdao

  • This paper analyzes how to realize secure access control for XML documents using RBAC from aspects of role, role hierarchy, authorization, etc.

    文中角色、角色继承授权等方面分析了如何利用RBAC实现XML文档安全访问控制

    youdao

  • This paper proposed a simple and secure access control mechanism that can effectively control mobile agents updating and creating ability in native host.

    本文提出了一个简单安全存取控制机制可以有效地控制移动代理本地主机更新创建权限。

    youdao

  • With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.

    随着信息技术风力发电中的应用风电场SCADA系统安全访问控制变得越来越重要。

    youdao

  • And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.

    角色的安全访问控制模型基础提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户

    youdao

  • Due to complexity of modeling workflow and problems of secure access control, a method that makes a workflow model by setting up task nodes, route nodes and their dependency is brought forward.

    针对工作流建模复杂性模型的安全存取控制问题提出一种通过建立任务节点路由节点及其依赖关系来创建工作流模型方法

    youdao

  • It enables you to rectify the problem by providing you with secure access to and control of all servers, routers, switches, and power devices in your remote data centers.

    使可以安全访问控制远程数据中心所有服务器路由器交换机电源设备,让您能够纠正问题

    youdao

  • It may be necessary to secure event payloads from unauthorized access using access control.

    可能需要使用访问控制保护事件负载免受未经授权的访问。

    youdao

  • Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.

    尽管这个文件 ACL (Access ControlList) 保护,允许根用户访问但是这对于安全性要求的系统可能不够

    youdao

  • In this case, the Cglib2AopProxy class creates the proxy objects you will need to control access to your secure beans.

    例中cglib2aopproxy创建安全bean访问控制所需代理对象

    youdao

  • Audit network access control and secure remote access systems.

    审计网络访问控制安全远程访问系统

    youdao

  • Discretionary Access Control is one of necessary and most common secure mechanisms in the secure operating system.

    自主访问控制机制安全操作系统必不可少、应用广泛安全机制之一。

    youdao

  • In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation.

    用户层次结构动态存取控制问题上,本文提出一种安全有效方案

    youdao

  • At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.

    最后使用此策略构造了一个基于属性证书授权访问控制模型,能够灵活方便实现电子政务中的安全访问控制。

    youdao

  • Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.

    采用消息过滤算法可以在支持对象模型多级安全系统实现强制访问控制

    youdao

  • In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.

    安全信息系统应用中,传统基于角色访问控制模型不能用户过滤业务数据容易导致数据失密

    youdao

  • It provided support of secure remote login, the secure file transfer, the access control and the port forwarding.

    提供了安全远程登录、安全文件传输访问控制端口转发支持

    youdao

  • Injecting RBAC mechanism into task nodes to restrict the role attribute can secure the access control of the workflow.

    任务节点引入RBAC机制角色属性进行约束以实现对工作流安全存取控制

    youdao

  • Aiming at the self-beneficial attack problem in layered multicast protocol, a secure layered multicast protocol is presented. The congestion state related access control algorithm is designed.

    针对分层协议存在的利型攻击问题提出一种安全分层组播协议,设计了基于拥塞状态访问控制算法

    youdao

  • The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.

    操作系统安全信息系统安全基石访问控制则是操作系统安全机制重要内容。

    youdao

  • Finally, discrete access control based on protection bits can't provide global secure policy based on individual user.

    基于保护的自主型访问控制,很难实现基于单个用户制定全局安全策略

    youdao

  • Labels are the foundation for implementing multilevel systems and the prerequisite of enforcing mandatory access control in secure systems.

    标记实现多级安全系统基础,实施强制访问控制前提

    youdao

  • The model can be used to solve the problem of access control to server and secure communication between browser and server.

    用于解决浏览器服务器访问模式服务器方访问控制以及浏览器服务器安全通信问题

    youdao

  • In this solution, SSL is used to ensure secure transmission. XML data signature and encryption are used to achieve secure dada format and XML access control mechanism is deployed.

    方案应用SSL实现安全数据传输、应用XML数字签名加密实现安全的数据表示以及应用安全的XML访问控制机制。

    youdao

  • Combining security of SSL protocol and find-grained access control, SSL VPN(Secure Socket Layer Virtual Private Netwrok) does well in resolving this problem.

    结合SSL加密特性粒度的访问控制,很解决了上述问题

    youdao

  • The other technology LDAP can provide a secure model to control access requirement according to identity information.

    LDAP提供了一个访问控制的安全模型根据身份信息对提出的访问请求进行控制。

    youdao

  • The other technology LDAP can provide a secure model to control access requirement according to identity information.

    LDAP提供了一个访问控制的安全模型根据身份信息对提出的访问请求进行控制。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定