The other technology LDAP can provide a secure model to control access requirement according to identity information.
LDAP提供了一个访问控制的安全模型,根据身份信息对提出的访问请求进行控制。
In a model where servers are reserved in advance, an initial investment is required to secure specific servers in certain areas to minimize the hourly usage of virtual machines (VMs).
在提前预留服务器的模式中,必须有一个初始投入以保护某些区域的特定服务器,从而最小化虚拟机(VM)每小时的使用量。
Specifically, you get a secure CMS to manage your data, an AS3 SWC file of classes tailored to your data model, and full documentation.
特别地,你会得到一个安全的CMS以管理数据,一个根据你的数据模型而定制的AS 3SWC文件及全部文档。
As a result, the open source model often builds higher quality, more secure, more easily integrated software.
因此,开源模式常常创建更高质量、更安全、更易于集成的软件。
A good model for password resets via question and answer was proposed by Viega and McGraw on page 95 of Building Secure Software (Addison-Wesley, 2002).
Viega与McGraw在《建立安全的软件》(addison -Wesley, 2002)一书的95页提出了通过问题与答案进行密码重置的较好模型。
Although the demand for secure web services is as important as having interoperable web services, the challenge to standardize a security model across heterogeneous platform remains.
虽然对安全的Web服务的需求和拥有可互操作的Web服务一样重要,在标准化跨平台的安全模型上仍存在挑战。
In this article, we provided an overview of the Domino security model and some specific Settings to make the Domino Web server more secure in a single-server environment.
在本文中,我们概述了Domino安全模型和某些特定设置,使DominoWeb服务器在单服务器环境中更安全。
The key issue of the electronic tax is to establish a secure and efficient protocol model.
电子税务的核心是建立一个安全有效的电子税务协议模型。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
By introducing application supporting layer, the model is able to support running various pre-existing applications in a secure operating environment.
在模型中增加应用支持层,实现在安全增强的操作系统环境下灵活支持已有应用程序。
Based on analysis of transaction security, a secure transaction model is given. Moreover, a correctness criterion for secure transactions, secure conflict serializability (SCSR) is proposed.
在对事务安全性分析的基础上提出了安全事务模型和安全事务正确性标准-安全冲突可串行化(SCSR)。
Based on our systemic model of information security, we design and implement a secure E-government information system.
基于我们提出的信息安全模型,设计并实现了一个基于该模型的电子政务信息安全系统。
Finally, it presents a secure implementation model of SET transaction, which ensures the validity, confidentiality, integrity and non-repudiation of transaction.
给出了一个SET交易的安全实现模型,它保证了交易的有效性、机密性、完整性和不可抵赖性。
A threat model for the malicious DBMS is proposed, and the corresponding antagonistic principles and mechanism are suggested under the hypothesis of existing secure operation environment.
描述了恶意dbms的威胁模型,提出了符合我国关键应用的环境安全假设,并在此基础上提出了相应的对抗原则和措施。
Due to complexity of modeling workflow and problems of secure access control, a method that makes a workflow model by setting up task nodes, route nodes and their dependency is brought forward.
针对工作流建模的复杂性和模型的安全存取控制问题,提出一种通过建立任务节点和路由节点及其依赖关系来创建工作流模型的方法。
This paper introduces a user-oriented secure communication model implemented in network layer for two trusted network nodes.
在网络节点可信的安全假设下,提出一种面向用户的网络层安全通信模型。
To design a signature scheme which are efficient and provably secure in the standard model is suitable for applications.
在标准模型下设计高效可证明安全的签名方案具有现实意义。
It provides a new valuable way of the construction of the national-level PKI secure certification model in the open networks.
这为构建国家级PK I安全认证模型的研究提供了一个有价值的新思路。
This passage bulids a secure control model with three layers on the ERTDB security requirements firstly, and then proposes a secure optimistic concurrency control strategy.
首先在分析嵌入式实时数据库安全要求的基础上,给出了一个三层安全控制模型。
A dynamic audit policy model based on secure spatial DBMS was proposed.
提出了一种基于安全空间数据库管理系统的动态审计策略模型。
In this paper, we attempt from a new view-Data Compact Ratio, to analyze and compare the data model, which is instructive for the improvement and realization of Multilevel Secure Data Model.
尝试从一个新的角度——数据紧凑度对数据模型进行分析和比较,对于多级安全数据模型的改进和实现具有一定的指导意义。
To solve the problem of data distribution and management in the distributed environment, this paper proposes a secure communication model based on smart card and password authentication.
针对分布式环境下的数据分发和管理问题,以智能卡与口令作为身份认证与密钥交换的基础,设计一个分布式数据传输安全模型。
A certificateless signature scheme provably secure in the standard model is analyzed. It points out that the scheme is insecure.
通过对一个标准模型下可证安全的无证书签名方案进行分析,指出该方案是不安全的。
By building linear programming model and giving a case, this thesis makes research on how to secure the cash chain with equity capital.
本文通过建立线性规划模型,并给出算例,研究中小房地产企业怎样利用自有资金维持资金。
This paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS.
该文提出安全的CIS体系结构模型以指导CIS的建设或改造。
In the theoretical aspect, current secure model and definition of general security cannot reflect characteristics of different applications. A more practical secure model is needed to be investigated.
在基础理论方面,现有的安全模型和一般安全性定义,不能够反映不同应用问题的特点,更实用的安全模型需要进一步研究。
Based on the model, the paper designs and implements a secure E-government information system.
基于此模型,我们设计并实现了一个安全电子政务信息系统。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
This paper proposes a generic audit policy model on multilevel secure DBMS.
提出了一种基于多级安全数据库管理系统的通用审计策略模型。
This paper presents a kind of secure communication protocol model-EABRA, by which network security communication can be realized easily and efficiently.
提出了一种安全的通信协议模型EABRA,通过该模型可以简单有效地实现网络安全通信。
应用推荐