SCA also provides a model for the assembly of business solutions from collections of individual services, with control over aspects of the solution such as access methods and security.
SCA还为单个服务集合的业务解决方案的组装提供了一个模型,并控制解决方案的各个方面,如访问方法和安全。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
To respond to these challenges, Max and his colleagues have developed Flume, an open source web application security infrastructure based on a Decentralized Information Flow Control (DFIC) model.
为了应对新挑战,Max和同事一起,以分布式信息流控制(DecentralizedInformation Flow Control, DIFC)模型为基础,开发了开源web应用安全基础设施flume。
Before you import the file containing your security model, import the file containing your cube model into the InfoSphere Warehouse control database using the Administration Console.
在导入包含安全模型的文件之前,使用Administration Console将包含多维数据集模型的文件导入InfoSphereWarehouse控制数据库。
Task based access control (TBAC) is an initiative security model, where task is focus of work and dynamic authorization is used.
基于任务的授权控制(TBAC)则是以任务为中心,并采用动态授权的主动安全模型。
So beneath this security attacking model of inner-mesh, we have to get more special security control management for all the component points and participants.
因此,在这样的一个模型下,必须对内网中所有实体对象进行更加全面、颗粒度更小的安全管理以及控制。
Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.
多级安全数据库的安全策略需要各种模型来表达,访问控制模型是其中之一。
Supported by a National 863 project, implementing flexible, security and effective model as objective, research on access control for XML documents is conducted in this paper.
本文在国家863项目的支持下,以实现灵活、安全而且高效的模型为目标,对面向XML文档的访问控制进行了全面的研究。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.
完善的安全体系,采用灵活的基于角色的访问控制模型,实现灵活的访问控制体系。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
The implement of the model depends on a message processing security model and an access control model.
模型依赖于一个消息安全处理模型和一个访问控制模型。
RBAC model is the most popular access control strategy because of its flexibleness, convenience and security.
RBAC模型具有灵活性、方便性和安全性的特点,因此成为访问控制策略的首选。
Task based Access Control Model is task centered and offers dynamic authorization , so it belongs to the active security model.
基于任务的访问控制模型是一种以任务为中心,并采用动态授权的主动安全模型。
Proposes the model of optimal preventive control based on voltage security in electricity markets.
给出了电力市场环境下基于电压安全的最优预测控制的模型及算法。
P2P model on the IPV6 can solve problem of security and control in the network finally.
IPV 6上的P 2 P模式能最终解决网络上的安全管理问题。
This passage bulids a secure control model with three layers on the ERTDB security requirements firstly, and then proposes a secure optimistic concurrency control strategy.
首先在分析嵌入式实时数据库安全要求的基础上,给出了一个三层安全控制模型。
Propose an object-oriented and formal access control model for developers to design security mechanism of systems and for users to perform their duties securely and efficiently.
采用对象技术提出了一个通用的访问控制模型,提供应用级的访问控制机制和安全管理方法。
Using the software EUROSTAG, overspeed protection control model was set up and the effect of OPC on power system security and stability was researched.
应用仿真软件EUROSTAG的模块自定义功能建立了带有超速保护的调速系统模型,通过仿真研究了超速保护控制对电力系统安全稳定的影响。
Traditional access control models, including MAC model and DAC model, have no longer been able to meet the security need of contemporary systems.
传统的访问控制模型——MAC模型和DAC模型,已远不能满足当代系统安全的需要。
The thesis dissertates access control policies and access control implementations, analyzes military security model and object protection in databases.
本文讨论了存取控制的策略、实现方法,分析了军用安全模型和数据库中的对象保护技术。
The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.
该系统的访问控制框架的结构与具体实现方法无关,能够满足群应用的不同安全要求以及动态群对安全性要求的变化。
This model can resolve various security problem of current applications, and can be extended to an access control model for the different domains.
该模型可以很好地解决现在一些系统中存在的安全问题,并且可以扩展成多域之间的安全互访问模型。
This security mechanism can effectively improve the ability of access control model to detect and control a pseudo-user.
该安全机制能有效提高访问控制模型对冒充用户访问的检测及控制能力。
It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.
统一描述策略元素和安全规则,支持多种访问控制模型,体现了良好的通用性。
This paper takes heading multiple area automatic commerce system (HDPOS5) for example, applied the improved base on position and role access control model to system, ensure the security of the system.
本文以海鼎多业态商业自动化系统(HDPOS5)为例,将改进的基于岗位与角色的访问控制模型应用到该系统中,更好的保证了系统的安全性。
The thesis is focused on the access control model for workflow systems and the security analysis of workflow systems by formal methods.
本文研究了工作流系统的访问控制模型及其安全性分析的方法。
Experimental results prove that this model makes the multiple strategies control more flexible, ensures the system security, and improves practicality of the system.
实验结果证明,该模型对多策略的支持更为灵活,在保证系统原有安全性的同时进一步提高了系统的实用性。
Experimental results prove that this model makes the multiple strategies control more flexible, ensures the system security, and improves practicality of the system.
实验结果证明,该模型对多策略的支持更为灵活,在保证系统原有安全性的同时进一步提高了系统的实用性。
应用推荐