The other technology LDAP can provide a secure model to control access requirement according to identity information.
LDAP提供了一个访问控制的安全模型,根据身份信息对提出的访问请求进行控制。
In the theoretical aspect, current secure model and definition of general security cannot reflect characteristics of different applications. A more practical secure model is needed to be investigated.
在基础理论方面,现有的安全模型和一般安全性定义,不能够反映不同应用问题的特点,更实用的安全模型需要进一步研究。
In a model where servers are reserved in advance, an initial investment is required to secure specific servers in certain areas to minimize the hourly usage of virtual machines (VMs).
在提前预留服务器的模式中,必须有一个初始投入以保护某些区域的特定服务器,从而最小化虚拟机(VM)每小时的使用量。
Specifically, you get a secure CMS to manage your data, an AS3 SWC file of classes tailored to your data model, and full documentation.
特别地,你会得到一个安全的CMS以管理数据,一个根据你的数据模型而定制的AS 3SWC文件及全部文档。
You must communicate that any conversion to an SOA model involves an inherent security paradox: the more SOA your systems are, the less secure they are.
您必需让大家认识到,到soa模型的任何转换都会涉及到固有的安全矛盾:系统的soa特征越明显,其安全性越差。
As a result, the open source model often builds higher quality, more secure, more easily integrated software.
因此,开源模式常常创建更高质量、更安全、更易于集成的软件。
Banks defend their model by arguing that they have to pay top dollar to secure the best employees, who maximise profits for shareholders.
为了维护该分配模式的合理性,各家银行争辩到它们必须用高薪才能留住最佳的员工,而这些人能使股东的利润最大化。
A good model for password resets via question and answer was proposed by Viega and McGraw on page 95 of Building Secure Software (Addison-Wesley, 2002).
Viega与McGraw在《建立安全的软件》(addison -Wesley, 2002)一书的95页提出了通过问题与答案进行密码重置的较好模型。
Comtech's Model MT-2012 mobile satellite transceivers feature secure global positioning system (GPS) capabilities, as well as embedded radio frequency identification (RFID) technology.
Comtech公司的典型mt- 2012机动卫星无线收发器具备安全的全球定位系统(GPS)能力,也能嵌入无线射频识别(RFID)技术。
Although the demand for secure web services is as important as having interoperable web services, the challenge to standardize a security model across heterogeneous platform remains.
虽然对安全的Web服务的需求和拥有可互操作的Web服务一样重要,在标准化跨平台的安全模型上仍存在挑战。
In this article, we provided an overview of the Domino security model and some specific Settings to make the Domino Web server more secure in a single-server environment.
在本文中,我们概述了Domino安全模型和某些特定设置,使DominoWeb服务器在单服务器环境中更安全。
Irrespective of the efficiencies brought by model-driven development and SOA-based service management, business applications must continue to secure information.
即使不考虑通过由模型驱动的开发和基于SOA的服务管理所提高的效率,业务应用程序仍须保护信息。
The rules in the new model are reasonable and secure by analysis, and will rise the positive effect to design information security architecture model.
分析表明,新模型中定义的规则是合理的、安全的,这对信息安全体系结构模型的构建将起到积极作用。
The model can satisfy the requirement of secure transaction, such as safety, no-deny, credibility, confidence.
该模型满足安全交易的要求,包括安全、不可否认、可信和隐私保护。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
The key issue of the electronic tax is to establish a secure and efficient protocol model.
电子税务的核心是建立一个安全有效的电子税务协议模型。
By introducing application supporting layer, the model is able to support running various pre-existing applications in a secure operating environment.
在模型中增加应用支持层,实现在安全增强的操作系统环境下灵活支持已有应用程序。
Based on analysis of transaction security, a secure transaction model is given. Moreover, a correctness criterion for secure transactions, secure conflict serializability (SCSR) is proposed.
在对事务安全性分析的基础上提出了安全事务模型和安全事务正确性标准-安全冲突可串行化(SCSR)。
Based on our systemic model of information security, we design and implement a secure E-government information system.
基于我们提出的信息安全模型,设计并实现了一个基于该模型的电子政务信息安全系统。
Third, We propose the secure Transfer Model of network-component aiming at the distributed secure communication of the network-component.
第三,针对网络构件的远程安全调用提出了网络构件安全调用信任模型。
This thesis begins with the analysis of secure requirement of network-component proposes the secure Transfer Model of network-component (STMNC).
本文就网络构件的运行安全调用提出了网络构件的安全调用信任模型。
Finally, it presents a secure implementation model of SET transaction, which ensures the validity, confidentiality, integrity and non-repudiation of transaction.
给出了一个SET交易的安全实现模型,它保证了交易的有效性、机密性、完整性和不可抵赖性。
This paper demonstrates that the new model is more secure and high-powered, good for view management and information integration, and can keep consistency and tractability of product data.
并论证了新的版本模型更安全、性能更高、更方便集成,能有效地支持视图,保证产品数据的完整性、一致性、有效性和可跟踪性。
Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.
采用消息过滤算法可以在支持对象模型的多级安全系统中实现强制访问控制。
Based on the model, we design and implement a secure E-government information system.
基于此模型,我们设计并实现了一个安全电子政务信息系统。
Since the presented protocol is based on information theoretic model, it is unconditionally secure.
由于此协议是在信息论通信模型下,所以协议是无条件安全的。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
Then the paper puts emphasis on explaining the design of solution to secure E-mail transfer in goal, running model and whole solution.
然后,该文着重从设计目标、运行模型和整体解决方案等核心内容出发阐述了安全邮件解决方案的设计。
This paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS.
该文提出安全的CIS体系结构模型以指导CIS的建设或改造。
The STMNC add security layer on traditional network-component system model, it insures secure communication between client and network-components.
在传统的网络构件体系模型上增加了安全层,它确保了客户和构件之间通信的安全性。
应用推荐