These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
The security policy is used for access control checks, which are performed by the JVM at runtime.
安全策略用于访问控制检查,这是由JVM在运行时执行的。
Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.
其他中介模式提供了对安全和管理策略定义点的直接或间接访问,以便中介流能够执行适当的控制。
More interestingly, if an attacker breaks into the Web server and becomes root, the attacker won't gain control over the whole system — given a good security policy.
更有趣的是,如果一个攻击者攻入了Web服务器并成为root,攻击者不会获得整个系统的控制权——如果有一个好的安全策略的话。
To predict the development trend of the building safe trouble, for drawing up enterprise security policy and safe early warning control system , has important reference meaning.
预测建筑安全事故的发展趋势,为制定企业安全政策和安全预警控制系统具有重要的参考意义。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
Lastly, the preserving security property of the fine-grained access control policy with respect to state transition is proven.
最后,证明了该细粒度协作访问控制策略关于协作系统的状态转换是保持安全的。
Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.
多级安全数据库的安全策略需要各种模型来表达,访问控制模型是其中之一。
Access control mechanism is an increasingly important content in security policy of distributed workflow management system.
访问控制机制是分布式工作流系统安全策略中的核心内容。
Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.
访问控制策略是网络安全策略的重要组成部分,基于角色访问控制策略以其方便有效的特点日益受到人们的关注。
It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.
统一描述策略元素和安全规则,支持多种访问控制模型,体现了良好的通用性。
Completes records by established security policyand fire control policy, and giving some ideas to the other departments so asto the hotel will be safety.
制定饭店安全保卫制度、防火制度,指导和协助酒店各个部门的安全管理。
Furthermore - the security management policy of project document, based on role - security-personnel, is presented to support information communication and security control.
提出基于角色权限人员的项目文档权限分配策略,支持了信息交流和安全控制。
Before 1970, in order to protect the information security in computer systems, mandatory and discretionary access control policy had been widely applied in secure computer systems.
在上世纪七十年代以前,为保证计算机系统中的信息安全性,自主存取控制和强制存取控制策略在计算机多安全级系统中得到了广泛的应用。
We mainly analyse design methodology, Transmission strategy and Access Control logic of Security Label. Then we present the design and implementation of Policy Configuration and Management platform.
文章重点讨论了安全标签的设计思想、传输策略和访问控制逻辑,然后给出系统策略配置管理平台的设计和实现。
We mainly analyse design methodology, Transmission strategy and Access Control logic of Security Label. Then we present the design and implementation of Policy Configuration and Management platform.
文章重点讨论了安全标签的设计思想、传输策略和访问控制逻辑,然后给出系统策略配置管理平台的设计和实现。
应用推荐