Security management process is needed to maintain the integrity of information and protect it assets.
需要安全性管理过程来维护信息的完整性并保护IT资产。
Figure 8 shows the business application services that use the business process and policy management component to provide business security services to the business applications of the enterprise.
图8显示了使用业务流程和策略管理组件为企业的业务应用程序提供业务安全服务的业务应用程序服务。
The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.
业务流程和策略管理组件使用了下面的安全组件,以实现它对业务应用程序的安全职责。
A typical process of policy based service security management can be divided into five steps and described as follows.
如下面所述,一个基于策略的服务安全管理的典型流程可以分为五大步骤。
We should also create a security intelligence strategy that includes process centric risk management.
我们还应该创建安全智能策略,其中包含了以流程为中心的风险管理。
It performs mediation, message transformation, routing, process choreography, and provides quality of service (security, reliable message delivery, and transaction management).
其执行调解、消息转换、路由、流程编排并提供服务质量(安全、可靠的消息传递和交易记录管理)。
This whole process is governed by security and management layers, which I don't discuss here.
整个流程由安全和管理层控制,在此不对其进行讨论。
Through the management of security construction process technology parameters on the highway construction technology meets the design requirements, guarantee the quality of highway construction.
需要通过对公路施工技术的管理工作保障施工过程工艺技术参数符合设计要求,保障公路施工质量。
The process actually helps in terms of security control and resource management.
这个过程实际上有助于在安全方面的控制和资源管理。
According to the complexity of key generation and management process, this paper presents an encryption algorithm based on fingerprint to enhance the security of the digital information.
根据密钥产生和管理过程的复杂性,为增强数字信息安全性,提出一种基于指纹的数字信息加密算法。
The openness, security, reliability and distributing process of CIMS have been analyzed to meet the requirement of database management System (DBMS) in CIMS.
针对CIMS环境对数据库管理系统(DBMS)的需求,对DBMS的开放性、安全及可靠性及分布式处理进行分析。
According to the market reaction to the process of acquisition, evidence supporting economic security is more than that in favor of management benefit protection.
从并购过程中的市场反应来看,支持经济安全威胁的证据比支持管理者利益保护的证据更强。
Senior management must unambiguously and enthusiastically support the security risk management process.
高级管理层必须明确且热情地支持安全风险管理流程。
The technology process has the advantages of non-pollution, management security, and so on. The major components of propellants can be reclaimed.
工艺流程具有环境友好、处理安全及推进剂主要成分可回收等优点。
Overview of operating system 2. Process management 3. Memory Management 4. Storage management 5. Distributed systems 6. Protection and Security.
作业系统概述2。行程管理3。记忆体管理4。储存体管理5。保护和保密6。分散式系统。
The security design means of management system are introduced from three parts, they are protecting user password, logging process safety & the implementation of logging in.
最后,从用户密码保护、登录过程的安全性和登录日志的实现三个方面介绍了管理系统所采取的安全设计方法。
In the container transportation, RFID significantly enhance the transparency and security of the transportation process of transportation, and this promotes the supply chain management.
在集装箱运输上,RFID显著的提高了运输过程的透明度和安全性,使得供应链管理的思想得到进一步的推广。
Immunity and study process of network security management platform was established base on SSE-CMM.
基于SSE - CMM评价体系,建立了网络安全管理平台的免疫和学习过程。
The safety management of engineering projects not only plays a significant role to assure security during the construction process, but also decreases the accident occurrence effectively.
工程项目的安全管理,对施工过程中的安全保障起着重要作用,也能减少事故的发生。
The system can process the security and navigation information aptitudinally, which make it suitable for the modern shipping management requirement much more.
由于智能化处理安全信息、导航信息,使之更符合现代船舶管理系统的要求。
A model of network management accounting system based on mobile agents was proposed and particularly studied on its structure, accounting management process and security mechanism.
提出了一种基于移动代理的网络管理计费系统模型,对其构成、计费管理过程和安全机制进行了详细的研究。
Security assessment is an important process to carry out information system risk management.
安全评估是对信息系统进行风险管理的一个重要步骤。
Then the security information management model in the SKJ2004 project is taken as an example to describe the implementation process of heterogeneous distributed database systems based on CORBA.
并以正在研发的数字矿井项目中的安全信息管理模块为例,介绍了基于CORBA的异构分布式数据库系统的实现方法。
Information such as user, inventory, the sales point, washing process, etc. can be recorded on the RAM of the tag, to form a complete washing-process and anti-theft security management system.
使用者、库存地、销售点、洗涤过程等资讯,皆可记载于电子标签,同时可应用于防窃保全,构成完整的洗涤及防窃安全管理系统。
On the other hand, accompanied issues like public security, city construction, civilized education and societal management in this process are emerging.
但另一方面伴随人口流动增加而带来的社会治安、城市建设、文化教育、社会管理等方面的问题也日渐浮出水面。
In addition to packaging, the client services include packaging procurement, design and pre-press management, printing process supervising, security and point of sales solutions.
他们面向全球客户,提供一体化的解决方案,整合原材料供应、包装设计、印刷管理、技术管理及物流管理为一体。
In addition to packaging, the client services include packaging procurement, design and pre-press management, printing process supervising, security and point of sales solutions.
他们面向全球客户,提供一体化的解决方案,整合原材料供应、包装设计、印刷管理、技术管理及物流管理为一体。
应用推荐