Task based Access Control Model is task centered and offers dynamic authorization , so it belongs to the active security model.
基于任务的访问控制模型是一种以任务为中心,并采用动态授权的主动安全模型。
Intrusion detection technology is an active security defensive technology that can overcome the shortcomings of traditional security technology.
入侵检测技术是一种主动防御型安全技术,可以弥补传统安全技术的不足。
However, most methods of the current combination still remain the combination of styles, that is, merely a vehicle USES active security technology and passive safety technology simultaneously.
然而,目前的大多数结合仍然停留在相加式的结合,即仅仅是在同一辆车上同时使用主动安全技术与被动安全技术。
Based on commonly procedure, with intelligent active security system, computer vision and action image process, we summarized a course to develop and test the DSP hardware and software system.
在DSP系统常规的开发过程基础上,结合汽车智能主动安全系统中的计算机视觉及动态图像处理,总结出了一套行之有效的DSP软硬件系统的开发、调试过程。
Active involvement in selecting technology standards, evaluating and selecting tools, macro and micro design, development, testing, implementation, reuse, and security aspects.
积极参与选择技术标准、评估和挑选工具、宏观和微观设计、开发、测试、实现、重用以及安全方面等等。
SPEXER 2000 is the worldwide first security radar using the newest radar technology of Active Electronically Scanning Array (AESA).
SPEXER 2000是全球第一个采用最新主动电子扫描阵列技术(AESA)的安全雷达。
While deployed, the squadrons of CVW 9 increased maritime security in the Western Pacific Ocean through their active presence and working with partner nations during exercises and port visits.
部署过程中,第9舰载机联队各中队通过其战场活动存在、与他国进行演习以及靠港访问巩固了西太平洋的安全形势。
Japan will "play active roles in various areas such as international peace cooperation activities" and build closer security ties with South Korea, Australia, India and ASEAN countries.
日本将“在众多领域里积极肩负起国际和平合作活动的重任”,密切与韩国、澳大利亚、印度和亚细安(简称东盟)等的合作往来。
Another installation issue involves establishing the appropriate security for both Lotus Domino and Active Directory administrators.
另一个安装问题涉及到为LotusDomino管理员和ActiveDirectory管理员建立适当的安全性。
The domain is governed by two security structures: The user registry, such as LDAP, Lotus Domino, or Microsoft Active Directory, and a master authorization policy database.
这个域由两个安全结构主导:用户注册表(比如LDAP、LotusDomino或MicrosoftActiveDirectory)和一个授权策略数据库。
We have covered how we restrict read access to Active Directory to members of the Pre-Windows 2000 Compatibility access security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre -Windows 2000 CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the “Pre-Windows 2000 Compatibility Access” security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre-Windows 2000CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
SecurityIncidentCoopA accesses the remote business process and retrieves a list of ready or otherwise active instances of security incident human tasks.
SecurityIncidentCoopA访问远程业务流程和检索安全事故人工任务的一组就绪或活动实例。
SecurityIncidentPortlet accesses the remote business process and retrieves a list of ready or otherwise active instances of security incident tasks.
SecurityIncidentPortlet访问远程业务流程和检索安全事故任务的一组就绪或活动实例。
Linux has very sophisticated networking, scripting, and security capabilities that are active even in a text-only environment.
即使是在纯文本的环境中,Linux同样拥有非常先进的网络、脚本和安全能力。
We believe that this increase is caused by a stronger sense of security, an increasing number of attacks and active attackers.
我们认为,这一增长是由更强的安全意识、不断增加的攻击面和活跃的攻击者等因素造成的。
Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.
在信息安全问题日益突出的互联网中,入侵检测技术以其主动防御的特性,得到越来越广泛的重视和应用。
We are also active about conducting cooperation with the rest of the world to safeguard the security of cyberspace.
同时,我们积极与世界各国开展合作,共同维护网络空间的安全。
map for Active Directory running on Windows 2000 and 2003, and /etc/security/ldap/sfur2group.
对于运行于Windows 2003 R2 的ActiveDirectory,组映射文件为 /etc/security/ldap/sfur2group.map。
In the Windows 2000 Active Directory, the Pre-Windows 2000 Compatibility Access security group was populated with the group Everyone which contained the anonymous users also.
在windows 2000 AD中“Everyone”组还包括匿名用户。
In the Windows 2000 Active Directory, the "Pre-Windows 2000 Compatibility Access" security group was populated with the group "Everyone" which contained the anonymous users also.
在windows 2000 AD中“Everyone”组还包括匿名用户。
The users of network have to adopt active defend technology and deep, various means to protect network security.
网络使用者必须采用积极的防御技术和纵深的、多样的手段来保证网络的安全。
Microsoft offers information about additional protections provided by the security software providers enrolled in Microsoft Active protections Program (MAPP).
微软提供的有关参加微软主动保护计划(MAPP)的安全软件供应商所提供的额外保护的信息。
Therefore, some active network security defense methods and counterattack methods need to be researched.
因此需要研究一些积极主动的网络安全防御手段和反击手段。
In developed countries, youth unemployment can be efficiently controlled because active employment security measures have been taken to promote the youth to get employed.
发达国家之所以能够较为有效地控制青年失业率,主要是因为实施了积极的就业保障措施来促进青年就业。
And explains the application of the active defense system and the passive defense system in network security.
阐述了主动防御系统与被动防御系统在网络安全中的应用。
The experience in ship safety management plays an active role in the enforcement of ship security.
船舶安全管理经验对实施船舶保安具有积极的作用;
The development of regional security architecture concerns the common interests of regional countries, and requires active participation and contribution of all parties.
地区安全架构建设事关地区国家的共同利益,需要各方积极参与,作出力所能及的贡献。
In recent years, the study on Internet worms has become one of the most active research topics in the field of network security and information security in the world.
网络蠕虫的研究已经成为近年来国际上在网络安全和信息安全领域最活跃的研究方向之一。
China plays the active role of a participant and propellent in the security cooperation, which has made great progress, with Southeast Asia and Central Asia.
中国在东南亚地区和中亚地区现有安全合作框架中起着积极参与者和推动者的作用,安全合作取得了不小的进展。
应用推荐