The author focuses on presenting the security architecture model of IP layer and practicing under this model in this paper.
本文的目的在于提出IP层安全体系结构模型,并用此模型去指导IP层安全的实践。
The rules in the new model are reasonable and secure by analysis, and will rise the positive effect to design information security architecture model.
分析表明,新模型中定义的规则是合理的、安全的,这对信息安全体系结构模型的构建将起到积极作用。
We briefly described the DB2 architecture, background processes, memory model, security, tools, and so on.
我们简要地描述了DB 2架构、后台进程、内存模型、安全性、工具等方面。
The security model requires only that each of the components can be identified in an interaction, which can be achieved at network architecture level or through use of generic application identities.
安全模型仅要求能够在交互中标识每个组件,这可以在网络体系结构级别或通过使用通用应用程序标识实现。
The architecture of the application doesn't match our { storage, network, deployment, security } model
这款产品的体系结构跟我们的{存储,网络,部署,安全}模型不匹配。
Now that those tools are accessible to every size shop — from global enterprises to a WebSphere MQ client-based application on a laptop — the security model can catch up to the architecture.
既然现在这些工具可由各种规模的企业—从全球企业到便携式计算机上的一个基于WebSphereMQ客户机的应用程序—访问,安全性模型就能适应架构变化的要求。
You model domain architecture views, such as Applications, Infrastructure, Networks, and Security, by creating ABBs to describe enterprise-critical system composition and behavioral patterns.
通过创建ABB以描述企业关键系统组成与行为性的模式,您可以为域架构视图建模,例如应用、基础设施(Infrastructure)、网络和安全。
It's important to understand the current security model, user roles, permissions and capabilities of the application. The following points helps in evaluating the maturity of security architecture.
重要的是要理解当前安全模型、用户角色、权限和应用程序功能。
The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.
可信网络架构安全模型是针对用户现有的网络安全资源进行有效整合和管理的。
Security model is based on system security requirements which provide specification for system security requirements and logic structure of security architecture.
安全模型是基于系统安全需求建立的模型,用于描述系统的安全需求和安全体系的逻辑构成。
The role specification AC and role assignment AC are introduced, the role-based PMI architecture and the role-based PMI security model for E-government is discussed and researched in the paper.
论文介绍了角色规范属性证书和角色指派属性证书,讨论了基于角色的PMI体系结构,探讨了基于角色PMI的电子政务安全模型。
To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.
针对这一应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行的可信平台的模型和体系结构。
The model can be used to guide the establishment of security architecture and security standards architecture.
该模型可以用于指导特定的安全体系结构的制定以及指导安全标准体系的制定。
This dissertation is based on the analysis of common architecture of active network and the security problems of SENCOMM, and discusses its hidden dangers, needs and trusts model.
本文基于对主动网络通用体系和SENCOMM的安全缺陷的分析,探讨其安全隐患、需求和信任模型。
The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.
该系统的访问控制框架的结构与具体实现方法无关,能够满足群应用的不同安全要求以及动态群对安全性要求的变化。
The depender graph trust model has good redundancy, and weakening the security of single CA will have not effect on the whole trust architecture seriously.
依赖图信任模型具有很好的冗余性,单个CA安全性的削弱对整个信任体系不会造成很大影响。
On the basis of the work above, this paper presents a brief overview of the basic theory and architecture of system security engineering capability maturity model(short for SSE-CMM).
在此基础上 ,提出了基于能力成熟模型的安全过程方法 ,介绍了系统安全工程能力成熟模型 (SSE CMM)的基本思想和体系结构。
The function of Trusting Model For Network Security Architecture was discussed, and three primary Trusting Models was present also.
讨论了安全体系结构的信赖模型的作用,以及三种常见的安全信赖模型。
The function of Trusting Model For Network Security Architecture was discussed, and three primary Trusting Models was present also.
讨论了安全体系结构的信赖模型的作用,以及三种常见的安全信赖模型。
应用推荐