In this case, you can use product-agnostic Unified Modeling Language (UML) notation to illustrate relationships between SOA security services, as shown in Figure 4.
在这种情况下,可以使用与产品无关的统一建模语言(Unified Modeling Language,UML)概念来说明SOA安全服务之间的关系,如图4中所示。
Project modeling in action: a decade in the life of the Social Security administration.
项目建模:社会安全管理委员会的十年周期。
Modeling for attack prediction is an important aspect of the research in network security.
对攻击预测建模是当前网络安全研究的一个重要方向。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
A new method to evaluate voltage security cost is presented using the capability of fuzzy modeling method in dealing with relaxed constraints.
利用模糊建模方法处理可松弛约束的能力,提出一种估计电力系统电压安全成本的新方法。
At the same time, some key problems, such as human computer interface, product engineering data modeling and description and security of the distributed system, are analyzed and described.
同时也对人机接口、产品工程数据建模,以及分布式安全等协同设计中关键问题的解决进行了分析说明。
In this article, Queuing theory and method is applied to modeling and optimization of a stochastic service system which consists of security equipments.
运用排队论的理论和方法对由机要保障装备构成的随机服务系统进行建模和优化。
The management information modeling of security components is one of the most important research points of integrated security management.
安全部件的管理信息建模是综合安全管理的核心内容之一。
Threat modeling is composed of three high-level steps: understanding the adversary's view, characterizing the security of the system, and determining threats.
威胁模型是由三个高阶步骤所组成:了解敌人的观点、描绘系统安全性的特徵,以及判断威胁来源。
To guarantee access security in network collaborative enterprise modeling systems, establishing access control function is in demand.
为了保证在网络化的协同企业建模系统中对模型的安全访问,需要建立一套有效的访问控制机制。
Aiming at the security of project management and the convenience of using requirements, this paper proposed project management and research on the role of analysis and modeling.
针对项目管理的安全性要求以及考虑到用户的使用方便性,提出了项目角色管理并进行研究分析并建模。
It realizes software security property modeling with the method of MDA, and reduces risk and cost of later development period.
利用MDA方法进行软件安全属性的建模,降低后期开发的风险与成本。
Chaos synchronization has very important applications in security communication, optimization of nonlinear system performance, modeling brain activity and pattern recognition.
混沌同步在保密通信、非线性系统性能优化、大脑行为建模以及模式识别等领域有着极为重要的应用。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
密码协议分析与设计的基础是对其进行形式化建模。
It is therefore important to understand all aspects of security, from the process of threat modeling during the design phase of your application, to its eventual deployment and ongoing maintenance.
因此,了解安全性的各个方面(从应用程序设计阶段期间的威胁建模过程到应用程序的最终部署和不断的维护)非常重要。
By means of mathematical modeling, this paper builds a general mathematical model of digital library information security risk management based on ISO 27000 series standards.
本文通过数学建模的手段,建立了基于ISO 27000系列标准的数字图书馆信息安全风险管理数学模型。
We get the achievements by excellent material, competitive price, lifelike modeling, novel design, environmental and security.
产品材料精良,价格合理,造型逼真,环保安全,款式新颖。
In this paper, some kinds of critically formal models for security protocols, which have recently catched much researcher's attentions, are analyzed in terms of their different modeling bases.
该文根据建模基础的不同,对目前处在研究热点中的几个重要协议形式模型进行了分类分析。
In this paper, some kinds of critically formal models for security protocols, which have recently catched much researcher's attentions, are analyzed in terms of their different modeling bases.
该文根据建模基础的不同,对目前处在研究热点中的几个重要协议形式模型进行了分类分析。
应用推荐