• SCA also provides a model for the assembly of business solutions from collections of individual services, with control over aspects of the solution such as access methods and security.

    SCA单个服务集合业务解决方案的组装提供了一个模型控制解决方案的各个方面,访问方法安全。

    youdao

  • This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.

    涵盖任何安全管理解决方案具有的要素,比如用户认证访问权限控制审计点登录可用性日志记录。

    youdao

  • IDS 11 provides a sound solution to these situation in Label-Based Access Control.

    IDS11通过基于标签的访问控制(Label -Based Access Control)这些情况提供良好的解决方案

    youdao

  • Access control within the portal domain is not based on the J2EE authorization model, because it is not powerful enough to be a viable solution for the portal authorization domain.

    门户域中访问控制没有基于J2EE授权模型因为不够强大不足以成为可行的门户授权域解决方案。

    youdao

  • After analyzing the excessive filtering rules, a solution to increase the performance of network access control equipment is proposed.

    分析过量规则网络访问控制设备性能影响,讨论针对这问题的解决方法

    youdao

  • In this solution, SSL is used to ensure secure transmission. XML data signature and encryption are used to achieve secure dada format and XML access control mechanism is deployed.

    方案应用SSL实现安全数据传输、应用XML数字签名加密实现安全的数据表示以及应用安全的XML访问控制机制。

    youdao

  • Do some research on the protection of the private information of ENUM users and the access control of ENUM resource record, and propose a solution based on the authentication of ENUM record access.

    研究ENUM用户隐私信息保护,对ENUM记录资源访问进行权限控制提出基于用户认证的ENUM记录级授权访问解决方案

    youdao

  • If you are the author of the document or have Full Control access, you can change the default so that your solution works.

    如果文件作者或者具有完全控制存取权限,您可以变更这个预设值方案能够执行。

    youdao

  • Anyone who has Full Control access to the document or workbook in your solution can use IRM to restrict permissions.

    解决方案中的文档工作簿具有完全控制访问权限的任何用户都能够使用“信息权限管理”限制权限。

    youdao

  • Absrtact: access control is one solution of computer security, which have straight and nature features. Role - Based access control has most important influence among all access control models.

    摘要访问控制众多计算机安全解决方案中的种,是直观自然的一种方案。

    youdao

  • Based on the characteristics of real estate evaluation system, system security solution from identity authentication, access control and data backup are discussed.

    房地产评估系统特点出发身份认证访问控制数据库备份三个角度来考虑评估系统安全问题

    youdao

  • In this paper, we introduce the role-based access control model, analyse the role hierarchy model and the problem of private permissions in RBAC96, and point out the disadvantage of Sandhu s solution.

    针对著名 RBAC96模型的不足之 ,结合私有权限、部门权限权限属性变化等问题 ,对角色权限角色层次关系进行了分析 ,提出了一个改进的角色层次化关系模型 。

    youdao

  • In this paper, we introduce the role-based access control model, analyse the role hierarchy model and the problem of private permissions in RBAC96, and point out the disadvantage of Sandhu s solution.

    针对著名 RBAC96模型的不足之 ,结合私有权限、部门权限权限属性变化等问题 ,对角色权限角色层次关系进行了分析 ,提出了一个改进的角色层次化关系模型 。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定