• When planning the security model for your application, you must address both elements to make sure your system has a sufficient level of security.

    应用程序规划安全性模型时,必须处理好这两个元素确保系统具有足够安全性。

    youdao

  • If you build a model of your system that is useful for predicting latency of user requests, it probably won't help you discover security holes.

    如果建立模型对于预测用户请求延时非常有效,不一定发现安全漏洞。

    youdao

  • With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.

    模型动态策略管理基础,形成一个防护检测响应为一体的完整安全体系从而主机系统实施综合安全保护

    youdao

  • This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.

    文中介绍了信息融合概念功能模型以及安全审计系统组成功能

    youdao

  • Based on our systemic model of information security, we design and implement a secure E-government information system.

    基于我们提出信息安全模型设计实现了一个基于该模型的电子政务信息安全系统

    youdao

  • Using this model, we can realize both the requirements of the static security policy of the system and the dynamic requirements of the real world.

    模型实现系统静态信息安全访问要求实现了权限管理动态的变化要求。

    youdao

  • The security model of the proxy server based on PDRR consists of protection system, detection system, response system, recovery system and expert system.

    基于防御-检测-响应-恢复代理服务器安全模型防御、检测系统、响应系统、恢复系统专家系统组成。

    youdao

  • With function of protection ring and security kernel, a novel model for enhancing security of operating system is proposed.

    利用保护安全内核功能提出了一种新的增强操作系统安全性模型

    youdao

  • This paper presents a dynamic defense model of network security, based on which a prototype system is implemented.

    文章提出了一个网络安全防护动态模型,并基于模型实现了系统原型

    youdao

  • This paper advances an invasion detection model in the network security based on multi-sensor data fusion, and introduces in detail the structure of invasion detection system.

    提出网络安全基于多传感器数据融合技术入侵检测模型对入侵检测系统体系结构进行了详细介绍

    youdao

  • This dissertation studies how to build trust model for grid computing in order to find out malicious users and improve security and reliability of system.

    本文研究如何网格计算建立信任模型排除内部恶意节点,提高系统安全可靠程度。

    youdao

  • In view of resource particularity in wartime information systems of blood security organizations, binary system coding mode and coarse granularity parallel model were adopted.

    考虑血液保障组织系统系统资源特殊性编码方式采用二进制编码并行模型为粗粒度并行模型。

    youdao

  • Based on the in-depth research of network communication and security technologies, this paper builds up a architectural model of cross-area logistics management system.

    论文深入研究网络通信技术安全技术基础上,构建了跨区域物流管理系统框架模型

    youdao

  • Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.

    数据完整性信息系统安全目标之一该文描述了一个时间相关数据库管理系统完整性策略模型

    youdao

  • On the basis of the P2DR network security model, the paper discusses design and implementation of the Inner Network Behaviors Monitor & Audit System (for short NBAMS).

    本文P2DR(策略、防护、检测、响应)安全模型基础上,详细论述了内部网行为监管审计系统设计实现

    youdao

  • In Chapter 4, the design of the data exchange system of Collaborative Commerce Platform based on the security model is discussed.

    第4章主要介绍了基于安全模型协同商务平台数据交换系统设计

    youdao

  • Based on the concept of AOP, introduced the measures how to enhance the Decision-Supported System (DSS) model of the security.

    介绍基于面向方面编程(AOP)思想增强决策支持系统(DSS)模型安全策略。

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型的特点进行了讨论

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • Security model is based on system security requirements which provide specification for system security requirements and logic structure of security architecture.

    安全模型基于系统安全需求建立模型,用于描述系统的安全需求安全体系逻辑构成

    youdao

  • A power system probabilistic dispatching model of coordinating security and economy has been established in this paper.

    该文构建电力系统安全经济相协调概率调度模型

    youdao

  • With the popularity of EFI, this model has a good prospect in achieving security on computer system.

    随着EFI普及实现安全计算机系统具有好的应用前景

    youdao

  • Methods: security telemedicine system model was constructed with theoretic analysis according to each security request of medical information.

    方法针对医疗信息各项安全要求进行理论分析构建安全远程医疗系统模型结果

    youdao

  • The security analysis of the network file service system is able to validate the security of model.

    通过网络文件服务系统安全性分析验证模型的安全性。

    youdao

  • In addition, we analyse the security of the whole network system integrating the five-layer model of network security mechanism, and put forward the corresponding tactics for every layer.

    另外结合网络安全机制模型整体网络系统安全进行分析针对层的安全性提出相应策略

    youdao

  • In allusion to the deficiency of image detecting ability of current network security system, anintelligent network security system model is developed based on image content detecting.

    针对目前网络安全系统对于图像信息监测能力不足问题,提出了一种基于图像内容的智能网络安全监测系统模型

    youdao

  • In this paper, we established a security calculation model for the decentralized system under high traffic flow and analyzed the change of system security with the change of traffic flow.

    本文建立流量条件分布式系统安全性计算模型分析了系统的安全性随空中流量增长而变化的规律。

    youdao

  • Starting from the computer network security and the commercial trade security, basing on the technology of network security and commerce security, this paper is presenting the security system model.

    电子商务系统计算机网络安全,商务交易安全性出发,在分析网络安全技术交易安全技术基础上,给出了一种保证电子商务安全的体系结构。

    youdao

  • Starting from the computer network security and the commercial trade security, basing on the technology of network security and commerce security, this paper is presenting the security system model.

    电子商务系统计算机网络安全,商务交易安全性出发,在分析网络安全技术交易安全技术基础上,给出了一种保证电子商务安全的体系结构。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定