The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.
安全数据库管理系统的安全策略可以为数据库提供强大的安全功能,现在BLP模型是用得比较普遍的策略模型之一。
This model consists of it security services, security policy infrastructure, business security services, and security enablers.
此模型由IT安全服务、安全策略基础设施、业务安全服务和安全支持因素组成。
The scalability benefit of the tag comes at the cost of sidestepping the Same Origin Policy security model, introducing potential attack vulnerabilities.
标记的可伸缩性优点的获得以避开同源策略安全性模型为代价,可能导致易于收到攻击。
Figure 4 shows the conversion from a WSDL document attached to a WS-Security Policy to a UML model.
图4显示了从附着于WS - Security Policy的WSDL文档转变为uml模型。
Flex clients will then ask for a policy file that is part of their security model.
Flex客户端随后会要求策略文件,这是其安全性模型的一部分。
IBM's SOA Security Expert Dr. Raj Nagaratnam explained in a recent interview that services are based on a trust model where authorization is delegated to a policy layer external to the application.
IBM的SOA安全专家RajNagaratnam博士在最近的采访中解释说,服务基于一种信任模型,其中将授权委托给应用程序外部的策略层。
This article focuses on the example of WS-Security Policy to demonstrate how to model nonfunctional metadata for Web services.
本文用WS - Security Policy的实例来示范如何为Web服务的非功能元数据建模。
With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
Using this model, we can realize both the requirements of the static security policy of the system and the dynamic requirements of the real world.
该模型既实现了系统中静态的信息安全访问要求,又实现了权限管理中动态的变化要求。
Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.
多级安全数据库的安全策略需要各种模型来表达,访问控制模型是其中之一。
The key problems of security interaction model design lie in the real-time distribution of policy and designing security interaction protocol.
策略的实时分发和安全联动交换协议的设计是安全联动模型设计的关键问题。
Then it gives the structure of security policy negotiation model including negotiation protocol, negotiation object and negotiation tactics etc.
接着在此基础上介绍安全策略协商模型的系统结构,主要包含协商协议,协商对象,协商策略等部分。
Integrated with goal refinement method and entity refinement method, an algorithm of policy refinement is proposed in this paper on the basis of layered-policy model for security policy.
本文基于安全策略的分层管理模型,提出了一个集目标求精和实体求精为一体的安全策略逐级求精算法。
Through the noninterference theory, it is proved that the model meets multilevel security policy.
通过不干扰原理对模型的安全性进行了证明。
It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.
统一描述策略元素和安全规则,支持多种访问控制模型,体现了良好的通用性。
Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.
现有的网格安全体系GSI主要是通过公钥体系及建立在其上的分布式信任模型来建立与维护虚拟组织内部的安全策略空间。
Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.
现有的网格安全体系GSI主要是通过公钥体系及建立在其上的分布式信任模型来建立与维护虚拟组织内部的安全策略空间。
应用推荐