本论文主要研究了CIMS系统中信息安全策略的建立及其技术实现问题。
The paper mainly studied the establishment and the technical implementation of information security strategy in CIMS.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
然而数据质量低下、敏感数据外泄、外部恶意窃取等问题随之而来,研究行之有效的信息安全策略已刻不容缓。
However, the problems such as low data quality, sensitive data leakage, external malicious theft and so on, it is urgent to study the effective information security strategy.
第二种安全策略规则类型是公开规则,它们指定在一个查询结果中可以公开哪些信息,以及公开结果对象的条件。
The second type of security policy rules, called disclosure rules, specifies what information can be disclosed in a query result and the conditions under which result objects are disclosed.
它还存储了单元的整体信息,比如单元范围的安全策略、票证有效期等。
It also stores the information about the cell as a whole, such as cell-wide security policy, ticket lifetimes, etc.
系统管理员可以通过审计系统记录与安全性相关的信息,以后可以分析这些信息,寻找违反和可能违反系统安全策略的地方。
The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.
现在,我们可以提取日常审计报告需要的信息,只提取与自己的审计安全策略有关的信息。
Now we can get down to extracting what information is required for a daily audit report, extracting the information that is relevant to your own audit security policy.
信息时代的到来需要计算机安全防护由被动防御转向主动,因此基于欺骗的网络安全策略日益受到重视。
Regaining the initiative of computer safe protection is required for Information Age. People pay more attention to network security tactics based on cheating technology.
为了解决这个问题,论述了在航空运输信息系统内建立数据库安全策略的问题。
In order to solve the problem, the paper discusses the method of establishing a set of database security strategies in air transportation information systems.
本文重点以本人所在单位后勤装备信息管理系统的设计过程为实例,详细分析了系统的整体方案设计和安全策略设计。
I mainly take the process of design as example which is the system of logistic equipment information management in my own workplace, analyse the system whole design safety carefully.
有关运行时如何决定授予的权限的更多信息,请参见安全策略和权限授予。
For more information about how the runtime decides which permissions to grant, see Security Policy and permission Grants.
有关公共语言运行时用来确定安全策略的证据的更多信息,请参见证据。
For more information about the evidence the common language runtime USES to determine security policy, see evidence.
下面的信息仅适用于级别1程序集或使用旧安全策略的程序集。
The following information applies only to Level 1 assemblies or assemblies using legacy security policy.
以及一体化信息安全防护体系的设计原则、系数设计、管理上的安全策略。
The design principle, system design and security strategy of integrative information security and protection architecture are discussed.
有些方法要求调用方提供证据。证据是构成安全策略决策(如哪些权限可以授予代码)的输入的一组信息。
Some of the methods require the caller to supply evidence, which is the set of information that constitutes input to security policy decisions, such as which permissions can be granted to code.
隐通道以一种违背系统安全策略的方式泄露秘密信息,对系统安全造成很大威胁。
Covert channel can leak sensitive information in a manner that violates the system's security policy, so it will threaten the security of the system.
建立了基于信息域安全策略的战术C3I系统逻辑安全体系结构。
The logical security architecture of tactical C3I systems is investigated based on all the information domain security policies.
为了在异构信息系统之间,能够有效地共享资源,就需要在异构系统间实现安全策略的协同。
It was necessary to coordinate security policies between interconnected enterprises. By this way the information could be Shared effectively.
信息系统安全的前提是确保安全策略的完备、正确和一致。
It is the precondition for the security of information systems to assure the completeness, correctness and consistency of security policies.
第四章通过信息系统开发的安全策略的研究并结合第三章得到了列车运行图信息系统安全模型。
Chapter 4 gives the security model of the TDIS by the studies on security strategies of information system.
第四章通过信息系统开发的安全策略的研究并结合第三章得到了列车运行图信息系统安全模型。
Chapter 4 gives the security model of the TDIS by the studies on security strategies of information system.
应用推荐