该项目还包括一个信息技术安全体系结构和概念。
The project also includes an IT-Security Architecture and Concept.
分析了3G系统的安全体系结构和安全特性的优缺点。
Analysizes 3g system security system structure and the advantages and disadvantages of the security specific property were analysized.
提出了计算机网络的一种实体安全体系结构(ESA)。
An entity security architecture (ESA) is proposed in this paper for computer networks, from the view of its entity components.
对等实体鉴别服务是网络安全体系结构中的一项重要服务。
The peer entity authentication is an important service in the network security architecture.
入侵检测系统(IDS)是信息安全体系结构的重要组成部分。
Intrusion detection system (IDS) is the key component of the architecture of information security.
该文为EJB容器设计了一个灵活的、可扩展的安全体系结构。
This paper designs a flexible, extensible security architecture for the EJB container.
建立了基于信息域安全策略的战术C3I系统逻辑安全体系结构。
The logical security architecture of tactical C3I systems is investigated based on all the information domain security policies.
文章提出了主机网络安全体系结构,并对其中的关键技术作了探讨。
In this paper, architecture of host-network security is presented, and then some key technologies of host-network security is discussed.
讨论了安全体系结构的信赖模型的作用,以及三种常见的安全信赖模型。
The function of Trusting Model For Network Security Architecture was discussed, and three primary Trusting Models was present also.
基于文中的安全体系结构和现有安全技术,阐述了电子政务安全系统的实现。
At the end of this paper, an E-government security system is discussed based on the architecture proposed and the security technologies.
本文首先讨论了计算机网络安全标准,重点分析了OSI安全体系结构标准。
First, the paper talked about the standard of security computer networking, mainly analyzing the structural standard for OSI security system.
该模型可以用于指导特定的安全体系结构的制定以及指导安全标准体系的制定。
The model can be used to guide the establishment of security architecture and security standards architecture.
入侵检测和防护系统已经成为部署“深度防护”安全体系结构的一种基本技术。
Intrusion detection and prevention systems have become an essential technology in the deployment of a "defense-in-depth" security architecture.
本文的目的在于提出IP层安全体系结构模型,并用此模型去指导IP层安全的实践。
The author focuses on presenting the security architecture model of IP layer and practicing under this model in this paper.
安全体系结构是构建安全信息系统的支撑框架,是主导信息系统安全开发的重要指南。
Security architecture is a base framework for building secure information systems and an important guideline for leading security development.
针对网络安全的隐患,提出了内部网络安全体系结构,并对其中的关键技术作了探讨。
In this paper, architecture of inner-network security is presented, and then some key technologies of inner-network security is discussed.
然后,作者演示了如何通过一个全面的系统方法来段安全体系结构域和测量的安全有效性。
The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach.
如果MDM客户机所处的安全体系结构使用SAML 1.1令牌,那么这个特性非常有帮助。
If the security architecture in which the MDM Client resides USES SAML 1.1 tokens, then this feature is a major benefit.
讨论了J2EE的安全体系结构,深入分析了J2EE的安全机制及其提供的核心安全服务。
The security architecture of J2EE was discussed and the security mechanism and its corresponding kernel security services were analyzed profoundly.
论述了信息安全基础:安全标准,安全表述模型,网络安全体系结构:几种典型的安全技术。
The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.
记录的信息安全体系结构及其组成部分的认识是至关重要的整体保护战略,并确定了单点故障。
Documenting the information security architecture and its components is critical to understanding the overall protection strategy, and identifying single points of failure.
顾名思义,PEP是安全体系结构中基于PD p中定义的策略执行身份验证和授权规则的位置。
As the name implies, a PEP is a point in the security architecture where authentication and authorization rules are enforced, based upon the policy defined in the PDP.
通过分析3G安全体系结构和移动通信系统的安全威胁,得出了3G体系结构存在的安全隐患。
The paper summarizes the security threats3G architecture is facing by analyzing the security features of3G security architecture and mobile communications system.
首先介绍了3G系统的安全体系结构、安全特性、安全目标,并详细阐述了网络接入安全机制。
The thesis starts with the introduction of the 3G security architecture, characteristics and aims, and the security mechanism of network access is elaborated at the same time.
分析表明,新模型中定义的规则是合理的、安全的,这对信息安全体系结构模型的构建将起到积极作用。
The rules in the new model are reasonable and secure by analysis, and will rise the positive effect to design information security architecture model.
本文从应用实践的角度,分析了CORBA安全体系结构,讨论了CORBA安全体系结构的应用特性。
This text has analysed CORBA safe system structure, has discussed the application characteristic of CORBA safe system structure in term of using practice.
本文主要讨论了对网络资源构成危害的可能性及其手段等网络安全性问题,说明了网络安全体系结构及其技术。
In this paper discusses mainly the possibility and means which make up harms to the network resources, and network security as well as policy, then introduces network security Architecture.
但在面向网格的结构中,因为需要支持终端用户SSO和动态瞬间服务,所以安全体系结构的信任关系很难建立。
Trust is hard to establish in a service-oriented grid architecture because of the need to support end user SSO and dynamic transient service.
针对认知无线电网络中出现的模仿主用户攻击和自私行为攻击问题,提出一种基于簇的分布式认知无线电网络安全体系结构。
To solve the primary user emulation attack and selfish misbehaviors in cognitive radio networks, this paper presents cluster-based security architecture for distributed cognitive radio networks.
针对认知无线电网络中出现的模仿主用户攻击和自私行为攻击问题,提出一种基于簇的分布式认知无线电网络安全体系结构。
To solve the primary user emulation attack and selfish misbehaviors in cognitive radio networks, this paper presents cluster-based security architecture for distributed cognitive radio networks.
应用推荐