• The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.

    安全数据库管理系统安全策略可以数据库提供强大的安全功能,现在BLP模型用得比较普遍的策略模型之一

    youdao

  • This model consists of it security services, security policy infrastructure, business security services, and security enablers.

    模型IT安全服务、安全策略基础设施业务安全服务安全支持因素组成

    youdao

  • The scalability benefit of the tag comes at the cost of sidestepping the Same Origin Policy security model, introducing potential attack vulnerabilities.

    标记可伸缩性优点获得以避开同源策略安全性模型代价可能导致易于收到攻击

    youdao

  • Figure 4 shows the conversion from a WSDL document attached to a WS-Security Policy to a UML model.

    4显示附着WS - Security PolicyWSDL文档转变为uml模型。

    youdao

  • Flex clients will then ask for a policy file that is part of their security model.

    Flex客户端随后要求策略文件安全性模型一部分。

    youdao

  • IBM's SOA Security Expert Dr. Raj Nagaratnam explained in a recent interview that services are based on a trust model where authorization is delegated to a policy layer external to the application.

    IBMSOA安全专家RajNagaratnam博士最近的采访中解释说,服务基于一种信任模型其中将授权委托给应用程序外部的策略

    youdao

  • This article focuses on the example of WS-Security Policy to demonstrate how to model nonfunctional metadata for Web services.

    本文用WS - Security Policy实例示范如何Web服务非功能元数据建模

    youdao

  • With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.

    模型动态策略管理基础,形成一个防护检测响应为一体的完整安全体系从而主机系统实施综合安全保护

    youdao

  • Using this model, we can realize both the requirements of the static security policy of the system and the dynamic requirements of the real world.

    模型实现系统静态信息安全访问要求实现了权限管理动态的变化要求。

    youdao

  • Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.

    多级安全数据库安全策略需要各种模型表达访问控制模型其中之一

    youdao

  • The key problems of security interaction model design lie in the real-time distribution of policy and designing security interaction protocol.

    策略实时分发安全联动交换协议设计是安全联动模型设计关键问题

    youdao

  • Then it gives the structure of security policy negotiation model including negotiation protocol, negotiation object and negotiation tactics etc.

    接着基础上介绍安全策略协商模型系统结构主要包含协商协议,协商对象,协商策略等部分。

    youdao

  • Integrated with goal refinement method and entity refinement method, an algorithm of policy refinement is proposed in this paper on the basis of layered-policy model for security policy.

    本文基于安全策略分层管理模型,提出了一个目标实体求精为一体的安全策略逐级求精算

    youdao

  • Through the noninterference theory, it is proved that the model meets multilevel security policy.

    通过干扰原理对模型的安全性进行了证明

    youdao

  • It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.

    统一描述策略元素安全规则支持多种访问控制模型体现良好通用性

    youdao

  • Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.

    现有网格安全体系GSI主要是通过公钥体系建立其上的分布式信任模型来建立与维护虚拟组织内部安全策略空间

    youdao

  • Current grid security infrastructure establishes the security policy space inside a VO mainly on basis of the public key infra-structure and distributed trust model.

    现有网格安全体系GSI主要是通过公钥体系建立其上的分布式信任模型来建立与维护虚拟组织内部安全策略空间

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定