• These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    youdao

  • Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.

    安全策略定义安全标签组成指定控制敏感数据访问规则

    youdao

  • The security policy is used for access control checks, which are performed by the JVM at runtime.

    安全策略用于访问控制检查JVM运行时执行的。

    youdao

  • Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.

    其他中介模式提供了安全和管理策略定义直接间接访问以便中介能够执行适当控制

    youdao

  • More interestingly, if an attacker breaks into the Web server and becomes root, the attacker won't gain control over the whole systemgiven a good security policy.

    有趣的是,如果攻击攻入了Web服务器成为root,攻击者不会获得整个系统控制权——如果好的安全策略的话

    youdao

  • To predict the development trend of the building safe trouble, for drawing up enterprise security policy and safe early warning control system , has important reference meaning.

    预测建筑安全事故发展趋势制定企业安全政策安全预警控制系统具有重要参考意义

    youdao

  • How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.

    基于此,研究了如何维持策略空间穿越中的安全信息完整性有效性,提出了基于安全信息的动态访问控制算法

    youdao

  • Lastly, the preserving security property of the fine-grained access control policy with respect to state transition is proven.

    最后,证明细粒度协作访问控制策略关于协作系统状态转换保持安全的。

    youdao

  • Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.

    多级安全数据库安全策略需要各种模型表达访问控制模型其中之一

    youdao

  • Access control mechanism is an increasingly important content in security policy of distributed workflow management system.

    访问控制机制分布式工作流系统安全策略中的核心内容

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.

    统一描述策略元素安全规则支持多种访问控制模型体现良好通用性

    youdao

  • Completes records by established security policyand fire control policy, and giving some ideas to the other departments so asto the hotel will be safety.

    制定饭店安全保卫制度防火制度,指导协助酒店各个部门安全管理。

    youdao

  • Furthermore - the security management policy of project document, based on role - security-personnel, is presented to support information communication and security control.

    提出基于角色权限人员项目文档权限分配策略支持信息交流安全控制

    youdao

  • Before 1970, in order to protect the information security in computer systems, mandatory and discretionary access control policy had been widely applied in secure computer systems.

    上世纪七十年代以前保证计算机系统中的信息安全性自主存取控制强制存取控制策略在计算机多安全级系统中得到了广泛的应用。

    youdao

  • We mainly analyse design methodology, Transmission strategy and Access Control logic of Security Label. Then we present the design and implementation of Policy Configuration and Management platform.

    文章重点讨论了安全标签设计思想传输策略访问控制逻辑然后给出系统策略配置管理平台的设计和实现

    youdao

  • We mainly analyse design methodology, Transmission strategy and Access Control logic of Security Label. Then we present the design and implementation of Policy Configuration and Management platform.

    文章重点讨论了安全标签设计思想传输策略访问控制逻辑然后给出系统策略配置管理平台的设计和实现

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定