The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Pulling together information from a variety of sources also carries with it security concerns, including access control.
将多种来源的信息整合在一起将会带来包括访问控制在内的安全性问题。
There are other businesses directives that a Chief Security Officer or a Chief Information Officer might need to express and control.
另外,首席安全官或首席信息官可能需要表述和控制其他业务指示。
Decentralized Information flow control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world.
DIFC这种安全手段,让应用程序的作者能够控制应用的组成部分与外部世界之间数据如何流动。
Document control and security: for managing access to business-critical information and certifying document authenticity with digital signatures.
文档控制和安全:目的是为了管理以业务为主的信息的访问以及使用数字签名验证文档的真实性。
To respond to these challenges, Max and his colleagues have developed Flume, an open source web application security infrastructure based on a Decentralized Information Flow Control (DFIC) model.
为了应对新挑战,Max和同事一起,以分布式信息流控制(DecentralizedInformation Flow Control, DIFC)模型为基础,开发了开源web应用安全基础设施flume。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
It also contains security namespace information and access control policies on all the Cognos objects.
它还包含针对所有Cognos对象的安全名称空间信息以及访问控制策略。
The “Mission Maker” initiatives for cyber security include embedding cyber security into command and control, adding it as an element of situational awareness, and enhancing information operations.
“使命制造(Mission Maker)”网络安全方案包括将网络安全嵌入到指挥控制,增加它作为态势感知要素,提高信息作战能力。
Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
According to the design requirements of safety technology, the establishment of industrial control information security management platform.
按照等级保护安全技术设计要求,建立工业控制信息安全管理平台。
If one page should not be cached, use "cache-control: no-cache, no-store" to make sure the page will not be cached, especially when the data involves security or sensitive information.
如果某个页面不应该被缓存,则使用“cache - control: no -cache, no -store”来确保该页面不会被缓存,尤其是当数据涉及安全或敏感信息时。
All these lead to the enterprise can not directly apply the mature it information security technology to the information security protection of the industrial control system.
这些都导致企业无法将成熟的IT信息安全技术直接应用于工业控制系统的信息安全保护。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
Through the research, this article has the guiding role to the Shaangu information system safety control, and has reference to the manufacturing enterprise information system security management.
通过研究,本文对陕鼓信息系统安全管理有指导作用,对制造型企业信息系统安全管理有借鉴作用。
National attention to the field of industrial control, it is bound to bring more opportunities for industrial information security market.
国家对工控领域的重视,也必然给工控信息安全市场带来更多的机会。
Consider the effectiveness of the company's internal control system, including information technology security and control.
评价公司内部控制系统的有效性,包括信息技术安全和控制。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
The conformation, control method and the information treatment ability of a control system are crucial factors to the reliability, security and stability of the system.
系统的构成和控制方式以及信息处理能力,对于控制系统的可靠性、安全性、稳定性而言,是决定性的因素。
The security center does not give any system maintenance information and users had to look for those information in other places inside Control Panel.
安全中心并没有给任何系统维护,信息和用户不得不寻找这些信息在其他地方在控制面板。
From data of accountant to information system of accountant, the paper builds the security control system of corporation accountant in the circumstance of E-commerce.
本文从点(会计数据)到面(会计信息系统)构建了电子商务环境下企业会计的安全控制体系。
Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.
访问控制是网络安全的一个重要组成部分,在保障电子政务信息的完整性、保密性和可用性方面发挥着重要作用。
The password setting and security mechanism of blue tooth technology provide the security guarantee of information appliance network and its remote control system.
通过设置密码和蓝牙技术的安全机制,提供了信息家电网络和远程控制系统的安全保障。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
Multilevel security requires additional mechanisms for enforcing mandatory access control that prevents the establishment of a signaling channel and prevents unauthorized disclosure of information.
多级安全能实施强制性访问控制,从而杜绝信息通道的产生,有效地阻止信息的非法泄露。
Access control is extremely important within a hierarchy in which users and their information are divided into several security grades.
在等级系统中,用户以及他所拥有的信息严格分成若干个安全等级,这种系统中的访问控制问题非常重要。
With wide area dynamic information, the fast and effective control by inter-connected power system security, stability and emergency control system becomes possible.
在广域动态信息条件下,使互联电网的安全稳定紧急控制系统的快速、有效控制的实际应用成为可能。
It made information system, from access system to operate database and sign badge, all these things under security control.
使该所信息系统从用户访问系统,到操作数据库与具体实现签章等工作,都处在系统安全控制之下。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
应用推荐