给出了一个SET交易的安全实现模型,它保证了交易的有效性、机密性、完整性和不可抵赖性。
Finally, it presents a secure implementation model of SET transaction, which ensures the validity, confidentiality, integrity and non-repudiation of transaction.
安全模型仅要求能够在交互中标识每个组件,这可以在网络体系结构级别或通过使用通用应用程序标识实现。
The security model requires only that each of the components can be identified in an interaction, which can be achieved at network architecture level or through use of generic application identities.
UDDI安全模型由注册中心和结点策略以及它们的实现集合定义。
The UDDI security model is defined by the set of registry and node policies and their implementations.
共同的思路是我们为消息传递实现的安全模型需要与我们使用消息传递的方式保持同步。
The common thread is that the security models we implement for messaging need to keep pace with the ways in which we use messaging.
当使用EJB安全模型调用服务实现、会话ejb时,将实现授权处理。
Authorization is achieved when the service implementation, session EJB, is called using the EJB security model.
实现扩展J2EE安全模型的JACC提供程序是一项复杂的任务,不应轻视。
Implementation of a JACC provider that extends the J2EE security model is a complex task and should not be undertaken lightly.
JACC为实现标准J2EE安全模型提供了良好的支持。
JACC provides good support for implementing the standard J2EE security model.
受到广泛认可的行业指导原则是,将能力成熟度模型集成(Capability Maturity Model Integration,CMMI)3-4级别(请参见 参考资料)作为实现企业SOA安全战略的基础。
The accepted industry guideline is Capability Maturity Model Integration (CMMI) levels 3-4 (see Resources as a basis for pursuing an enterprisewide SOA security strategy.
WebSphereAppplicationServer的Web服务安全性(WS-Security)功能通过声明性的模型使得可以在部署 Web 服务的实现时启用这些功能。
The WebSphere Appplication Server's WS-Security function allows the enablement of capabilities during deployment of the web services implementations through a declarative model.
要使用的数据源、安全性、数据结构、数据质量、数据标准和整个数据模型的有关决策一般需要在真正的实现开始之前就完成。
Decisions about data sources to be used, security, data structure, data quality, data standards, and an overall data model will typically need to be completed before actual implementation begins.
元数据模型还与事件检验和安全性的定义和实现紧密集成。
The metadata model is also tightly integrated with the definition and implementation of the event validation and security.
在一定程度上,由于使用DOM模型是实现规范化最简单的一种方法,因此XML安全性库都被设计为操作XML的DOM表示。
Partly because canonicalization is most easily implemented using a DOM model, the XML security libraries are all written to work with DOM representations of XML.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
当为Web服务环境选择和实现安全模型时,安全报头标记和受信任上下文都是要重点考虑的特性。
Security header tokens and trusted context are important features to consider when choosing and implementing the security model for your Web services environment.
由上面两图可知:身份验证是通过交换GSS - API令牌来实现,这对于GSS - API安全模型非常典型。
As you can see in the above figures, the authentication is achieved by exchange of GSS-API tokens, which is very typical with the GSS-API security model. The key points to notice here are.
该模型既实现了系统中静态的信息安全访问要求,又实现了权限管理中动态的变化要求。
Using this model, we can realize both the requirements of the static security policy of the system and the dynamic requirements of the real world.
在模型中增加应用支持层,实现在安全增强的操作系统环境下灵活支持已有应用程序。
By introducing application supporting layer, the model is able to support running various pre-existing applications in a secure operating environment.
基于我们提出的信息安全模型,设计并实现了一个基于该模型的电子政务信息安全系统。
Based on our systemic model of information security, we design and implement a secure E-government information system.
本文在P2DR(策略、防护、检测、响应)安全模型的基础上,详细的论述了内部网行为监管审计系统的设计和实现。
On the basis of the P2DR network security model, the paper discusses design and implementation of the Inner Network Behaviors Monitor & Audit System (for short NBAMS).
采用消息过滤算法可以在支持对象模型的多级安全系统中实现强制访问控制。
Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.
本文在国家863项目的支持下,以实现灵活、安全而且高效的模型为目标,对面向XML文档的访问控制进行了全面的研究。
Supported by a National 863 project, implementing flexible, security and effective model as objective, research on access control for XML documents is conducted in this paper.
通过分析r BAC模型结构,提出并设计实现了统计管理系统中数据库安全访问控制的新方法。
A novel method for designing and implementing database safe access control in a statistic management system is proposed on the basis of analyzing RBAC model.
完善的安全体系,采用灵活的基于角色的访问控制模型,实现灵活的访问控制体系。
Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.
这个访问控制模型既能保护企业资源的安全,同时又能实现协作环境内的资源共享。
This AC model can protect the assets and share the resource in collaborative environment.
提出了一种安全的通信协议模型EABRA,通过该模型可以简单有效地实现网络安全通信。
This paper presents a kind of secure communication protocol model-EABRA, by which network security communication can be realized easily and efficiently.
研究了实现操作系统安全增强模型通用化的途径。
Ways to make general of a security enhancement model for operating systems are studied.
详细分析设计系统功能,并构建了系统实现安全管理的逻辑模型、拓扑模型以及安全认证模型。
It analyzes and designs the system's function module, moreover constructs the logic model, topology model and safety authentication model.
首先分析其体系结构,然后介绍系统如何实现仿真模型及动态数据的统一命名、定位、安全操作和数据一致性。
The thesis begins with analysis of system structure, then introduces realization of simulating models, naming, location, security operation of dynamic data, and data consistency.
提出了一个基于威胁评估和模拟攻击的安全风险评估模型,设计并实现了网络安全评估原型系统。
A risk assessment model based on threat assessment and simulation attack is proposed, and a kind of prototype system is designed and realized.
提出了一个基于威胁评估和模拟攻击的安全风险评估模型,设计并实现了网络安全评估原型系统。
A risk assessment model based on threat assessment and simulation attack is proposed, and a kind of prototype system is designed and realized.
应用推荐