Have security requirements like access control and data privacy been met in both existing and legacy systems?
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
Ben also talked about advanced web security requirements like method level authorization, JSR-250 for defining method security metadata, Spring security method metadata, and domain access control.
Ben还谈到了一些高级web安全需求,例如方法层的授权、定义方法安全元数据的JSR- 250规格、SpringSecurity方法元数据以及领域的访问控制等。
According to the design requirements of safety technology, the establishment of industrial control information security management platform.
按照等级保护安全技术设计要求,建立工业控制信息安全管理平台。
This passage bulids a secure control model with three layers on the ERTDB security requirements firstly, and then proposes a secure optimistic concurrency control strategy.
首先在分析嵌入式实时数据库安全要求的基础上,给出了一个三层安全控制模型。
The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.
该系统的访问控制框架的结构与具体实现方法无关,能够满足群应用的不同安全要求以及动态群对安全性要求的变化。
Cantonese fare time request of quality, the security requirements, progress control and cost control.
本楼的质量要求,安全要求,进度控制以及成本控制。
The working environment of the feeding and loading control system was usually more severe. Therefore, the requirements for the security, reliability and easy maintenance are more demanding.
送料装车控制系统的工作环境通常比较恶劣,所以对送料装车控制系统工作的安全性、可靠性、维护简便性要求较高。
According to the data transfer requirements, which focus on security, high efficiency and timely information feedback, a 4-control-file-centered FTP data transfer model is presented.
针对数据传输的安全性、数据传输效率、及时的信息反馈等问题,提出了以四个控制文件为中心的FTP数据传输模型。
According to the data transfer requirements, which focus on security, high efficiency and timely information feedback, a 4-control-file-centered FTP data transfer model is presented.
针对数据传输的安全性、数据传输效率、及时的信息反馈等问题,提出了以四个控制文件为中心的FTP数据传输模型。
应用推荐