• In this dissertation the integrated and privilege-role extended UNIX operating system security model, which is based on the BLP model, is discussed.

    BLP模型进行分析基础上,提出了BLP模型基础的完整性特权角色扩展UNIX操作系统安全模型。

    youdao

  • The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.

    安全数据库管理系统安全策略可以数据库提供强大的安全功能,现在BLP模型用得比较普遍的策略模型之一

    youdao

  • The Biba security model is in essence the opposite of the BLP system, since it promotes no reading down and no writing up.

    比巴安全模型本质相反二层规划系统因为可以促进没有下来,没有文字阅读起来。

    youdao

  • In makes an applied multi-level relation model to be basement of security database for following the BLP model.

    为了适应BLP模型,采用一种实用多级关系 模型作为安全数据库基础原有 关系 模型的扩展。

    youdao

  • The mechanism of buffer overflow from the point of view of security operating system is analyzed, buffer overflow with BLP model is formalized.

    首先分析操作系统客体类型,将客体分为静态客体动态客体,然后总结了安全操作系统中对客体的处理存在的问题。

    youdao

  • The mechanism of buffer overflow from the point of view of security operating system is analyzed, buffer overflow with BLP model is formalized.

    首先分析操作系统客体类型,将客体分为静态客体动态客体,然后总结了安全操作系统中对客体的处理存在的问题。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定