This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.
这创造了一个非常安全的环境,因为应用在没有获许的情况下是不能访问系统的其他部分的。
By sitting between the rest of the operating system and the actual disk, CGD looks and ACTS like any other disk drive attached to the system, allowing for transparent access to secure storage.
CGD位于操作系统中的其他部分和实际磁盘之间,CGD可以作为连接到系统的其他磁盘设备,允许对安全存储数据进行透明访问。
Secure: The system authenticates access to data and services [1]
安全:系统对数据和服务的访问提供认证。
The prototype system realizes the key parts of the secure component: authentication center, message secure proxy and access controler.
该原型系统实现了安全构件的关键部分:认证服务器、消息安全代理和访问控制器。
Discretionary Access Control is one of necessary and most common secure mechanisms in the secure operating system.
自主访问控制机制是安全操作系统必不可少的、应用最广泛的安全机制之一。
With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.
随着信息技术在风力发电中的应用,风电场SCADA系统的安全访问控制变得越来越重要。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
Identity authentication is an important part of a perfect secure system, the first defense, and the foundation of secure communication and access control.
身份认证是一个完善的安全系统的重要组成部分,是第一道安全屏障,它是安全通信和访问控制的基础。
Virtual Sandbox is a secure software system designed to allow unknown or untrusted programs to be run in an isolated environment without access to personal files, local networks, and system Settings.
虚拟沙盒是一个安全的软件系统,旨在使不明或不信任的程序运行在一个孤立的环境中获得的个人档案,本地网络和系统设置。
The access control is one of the most important characteristics in the secure operating system.
访问控制是安全操作系统中最重要的特性之一。
NET technology site in the database and access a secure connection, the system can be transplanted high and has a good business scalability.
NET技术实现网站中对数据库的安全连接和访问,系统的可以移植性高且具有良好的业务扩展性。
To keep independent object-oriented system secure from Trojan horse, there exists already a restrictive policy that blends information flow control with discretionary access control.
描述了面向对象系统的数据模型,研究了信息流和信息传输,并以此为基础给出了基于自主访问控制策略的分布式对象系统的信息流控制方法。
Yet, they'll still have full, secure, remote access to your company's phone system, data network, customer database, and other tools they need to be productive.
然而,他们还是有充分的,安全,远程访问您的公司的电话系统,数据网络,客户数据库,和其他工具,他们需要得到的生产力。
Are the Card Access System records of daily transactions maintained in a secure area for at least 60 days by Security?
保安部对所有出入口的门禁系统作日常的检测,且保存检查记录至少60天吗?
Dublin Port Tunnel is the largest ever civil engineering project in Ireland. To meet the client's requirements, the highly secure CEM AC2000 SE (Standard Edition) access control system was chosen.
都柏林港口隧道需要全面、完整集成的安防管理解决方案,集成各种安防系统。其旨在通过位于主现场控制室的单个安防管理系统集中监控整个隧道,从而为隧道用户创建安全的设施和环境。
Dublin Port Tunnel is the largest ever civil engineering project in Ireland. To meet the client's requirements, the highly secure CEM AC2000 SE (Standard Edition) access control system was chosen.
都柏林港口隧道需要全面、完整集成的安防管理解决方案,集成各种安防系统。其旨在通过位于主现场控制室的单个安防管理系统集中监控整个隧道,从而为隧道用户创建安全的设施和环境。
应用推荐