网站首页  词典首页

请输入您要查询的英文单词:

 

单词 security model
释义

security model

  • 网络安全模型;资讯安全模型;安全模组
1.
安全模型
Android 助力云计算 ... 服务( Services) 安全模型Security model) 活动( Activities) ...
www.ibm.com
2.
资讯安全模型
资讯看板 in... ... 资讯安全漏洞 security vulnerability 资讯安全模型 security model 资讯安全内容 security context ...
glosbe.com
3.
安全模组
...one 8 的档案系统(File system)、安全模组Security Model)、网路堆叠(Network Stack)、驱动程式模型(Driver Mod…
keith503.blogspot.com
4.
保全模型
...新设计的单层(one-tier,又译为中央集权式)保全模型security model),相容於SDL语言(Semantic Delivery Language …
pdt.acesuppliers.com
5.
计算机安全模型
... 电脑安全事件回应小组 incident response team 计算机安全模型 security model 电脑安全物件注册 security objects register ...
www.docstoc.com
6.
安全性模组
接著,我们对於多重伺服器环境,提出安全性模组(security model),并提出了一个应用在多重伺服器环境下,以身分为基础的 …
ir.ncue.edu.tw
7.
安全模块
参见看安全模块( Security Model)文档以了解有关授权的更多信息。 一个manifest可以包含零个或多个这样的节点。
hi.baidu.com

例句

释义:
1.
The kernel usually has some sort of security model that manages access to devices, files, processes, and objects.
内核通常具有某种类型的安全模式来管理对设备、文件、进程和对象的访问。
www-128.ibm.com
2.
Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.
显然,您需要考虑某种安全模型以限制不可信资源的加载。
www.ibm.com
3.
However, the JACC provider is not limited by the static nature of the standard J2EE security model.
不过,JACC提供程序并不仅限于标准J2EE安全模型的静态特性。
www.ibm.com
4.
In view of the diversity of means of attack from attacker, the formal security model was used to prove the security of the AKE protocol.
鉴于攻击者攻击手段的多样性,人们提出了形式化安全模型用来证明协议的安全性。
www.13191.com
5.
The Biba security model is in essence the opposite of the BLP system, since it promotes no reading down and no writing up.
该比巴安全模型在本质上是相反的二层规划系统,因为它可以促进没有下来,没有文字阅读起来。
www.phpfans.net
6.
The primary security duty of a requirements specifier is to identify at a high level the core security model for the application.
对需求最主要的安全责任是为应用程序定义一个高水平的核心安全模型。
www.ibm.com
7.
The security model must be comprehensive enough to allow such intermediaries.
因此安全性模型必须足够全面,从而可以允许这些中介。
www-128.ibm.com
8.
BLP is a security model that relies on the overlying concept of state machine concepts, and focuses mostly on the C on the CIA triad.
的BLP安全模型是一个依赖于覆盖其上的概念,状态机的概念,主要注重于对美国中央情报局的C黑社会。
www.phpfans.net
9.
NET Security model fills volumes, but you can take a small set of reasonable actions to enable your assemblies to interact with the .
NET安全模型实现得要几卷书,但是你可以采取一小部分合理的动作,使你的程序集更容易的和。
dictsearch.appspot.com
10.
Be aware that this combination can compromise your security model.
注意此组合可能会危及您的安全模型。
msdn2.microsoft.com
1.
First of all, this paper described the definition and the security model of the identity-based encryption.
首先叙述了基于身份的加密定义和安全模型;
www.ceps.com.tw
2.
Finally a case of security model of a manufacturing enterprise information system was given.
最后给出了一个制造企业信息系统安全模型实例。
www.ceps.com.tw
3.
The goal of his research is to define a security model for these new types of applications and architectures.
Max的研究目标是为新类型的应用和架构定义一个安全模型。
www.infoq.com
4.
This suggests a tiered security model where the spoke nodes are the baseline and the hub is hardened, similar to a gateway.
这让人想起分层的安全模型,其中分支节点是基准,对中心加以硬化,类似于网关。
www.ibm.com
5.
IBM DB2 CM has a flexible security model which lets the administrator decide on the kind of security for the ECM system.
IBMDB2CM提供了灵活的安全模型,管理员可以使用它确定对ECM系统应用哪种安全类型。
www.ibm.com
6.
We started with a note on the importance of security in a distributed environment and an overview of DCE security model.
我们首先强调了安全性对分布式环境的重要性,概述了DCE安全模型。
www.ibm.com
7.
You can also create custom groups at any of these levels with specific permissions to better fit your security model.
还可以在这些级别创建具有特定权限的自定义组,以便更好地适应安全模型。
msdn.microsoft.com
8.
By using these methods, we develop the BLP Model into a new Multi-level Security Model with memory ability.
通过这些方法将BLP模型改造成为具有记忆能力的新型多级安全模型。
www.bing.com
9.
The new security model does not grant administrative privileges at all times.
新的安全模型不会在所有时间都授予管理特权。
technet.microsoft.com
10.
The UDDI security model is defined by the set of registry and node policies and their implementations.
UDDI安全模型由注册中心和结点策略以及它们的实现集合定义。
www.ibm.com
1.
Distributed environment security implements an advanced and complex security model as shown in Figure 1.
分布式环境安全机制会实现一种高级且复杂的安全模型,如图1所示。
www.ibm.com
2.
DB2 data can then be used in a wide range of tools and enterprise applications within the Lotus Notes Security model.
然后,DB2数据可以用于各种工具以及应用LotusNotes安全模型的企业应用程序中。
www.ibm.com
3.
IPsec is based on an end-to-end security model that establishes trust and security from a source IP address to a destination IP address.
IPsec基于从源IP地址到目标IP地址建立信任和安全机制的端到端安全模型。
technet.microsoft.com
4.
This security model allows administrators to restrict access to trusted origins in a very flexible way.
该安全性模型允许管理员以一种非常灵活的方式,来限制对受信任站点的访问。
www.ibm.com
5.
It is recommended that you use the default integrated security model when running the Business Scorecard Manager Web service.
建议您在运行BusinessScorecardManagerWeb服务时使用默认的集成安全性模型。
office.microsoft.com
6.
Authentication and Authorization extend the Equinox Security model to allow for security in a distributed system.
扩充了Equinox安全模型的认证和授权将增强分布式系统的安全性。
www.infoq.com
7.
Negative security model. A negative security model monitors requests for anomalies, unusual behaviour, and common web application attacks.
消极(negative)安全模型:消极安全模型监控那些异常的、不常用的和通用的WEB攻击类请求。
blog.sina.com.cn
8.
For us, though, SQL Relay improves overall performance, simplifies development, testing, and deployment, and strengthens our security model.
但是,对于我们而言,SQLRelay改进了整体性能,简化了开发、测试和部署,并且增强了安全模型。
www.ibm.com
9.
The IBM Cognos security model allows you to manage users as member of roles and groups.
IBMCognos安全模型允许将用户作为角色和组的成员来进行管理。
www.ibm.com
10.
The Jazz security model gives this user basic admin privileges in Jazz but no particular rights within a given Project Area.
Jazz安全模型给与了这个用户基本的管理员特权,而不是给定ProjectArea内特定的权利。
www.ibm.com
1.
To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.
为了解决这些问题,我们需要一种具有灵活加密方案的端到端安全性模型以满足一系列不同的需求。
www.ibm.com
2.
A Cube Server does not start enforcing the rules in the security model until the Cube Server is started.
CubeServer只有在启动后才能实施安全模型中的规则。
www.ibm.com
3.
The SOA security model is based on a process in which a Web service can require an incoming message to prove a set of claims.
SOA安全模型基于Web服务可能需要其中的传入消息以验证一系列声明的过程。
www.ibm.com
4.
The activation context is used during manifest-based activation to set up the domain policy and provide an application-based security model.
激活上下文在基于清单的激活期间使用,以设置域策略和提供基于应用程序的安全模型。
msdn2.microsoft.com
5.
Finally combined with classic non-interference theory, the security model was extended from process environment to the whole system.
最后结合经典无干扰理论,将本模型由进程环境扩展为适用于整个系统安全的模型。
www.jsjkx.com
6.
Therefore, a research on Campus Card financial settlement system and security model has both theoretical and practical importance.
研究河南大学一卡通财务结算系统和安全模型具有重要的理论意义和实践价值。
www.fabiao.net
7.
You can set the security model of a device explicitly to test an application under the various security models.
可以显式地设置设备的安全模型,以便在各种不同的安全模型下测试应用程序。
msdn2.microsoft.com
8.
Depending on the security model of your host, you might best do this as sudo stunnel .
根据主机的安全性模型,您最好是执行下面的命令:sudostunnel…。
www.ibm.com
9.
The positions of dominant and non-dominant security model in the system are changeable.
体系内主导安全模式与非主导安全模式的地位是可以转换的。
www.fabiao.net
10.
Finally, Combine the two aspects an integrated security model to be got.
最后把二者结合起来形成一个完整的安全模型。
www.magsci.org
1.
The security metadata associated with the cube and dimension in the existing security model are kept in the resulting security model.
与现有安全模型中的多维数据集和维度关联的安全元数据保留在生成的安全模型中。
www.ibm.com
2.
The role-based security model supports a permission object similar to the permission objects found in the code access security model.
基于角色的安全性模型支持与代码访问安全性模型中的权限对象类似的权限对象。
msdn2.microsoft.com
3.
For information about the permissions required by the Distribution Agent and the Merge Agent, see Replication Agent Security Model.
有关分发代理和合并代理所需权限的信息,请参阅复制代理安全性模式。
technet.microsoft.com
4.
Role-based security is central to the security model of Reporting Services and understanding its implications is important.
基于角色的安全性是ReportingServices安全模型的核心,了解其含义非常重要。
technet.microsoft.com
5.
Alternatively, the server can use system calls to build a security model that restricts operations to those permitted to that user.
或者,服务器可以使用系统调用来构建安全模型,从而将操作限制到允许该用户执行的操作。
www.ibm.com
6.
Workplace Designer components support the role-based security model of Workplace applications.
WorkplaceDesigner组件支持Workplace应用程序基于角色的安全模型。
www-128.ibm.com
7.
Let's start with a brief review of the multi-layered Domino security model.
让我们从简要回顾多层Domino安全模型开始。
www.ibm.com
8.
For more information about the permissions that are required by each agent account, see Replication Agent Security Model.
有关每个代理帐户所需权限的详细信息,请参阅复制代理安全性模式。
msdn2.microsoft.com
9.
Dialog security must be manually configured according to the Service Broker dialog full-security model.
必须按照ServiceBroker对话完全安全模式手动配置对话安全模式。
msdn2.microsoft.com
10.
We begin with a quick overview of the Domino security model.
我们将从快速浏览Domino安全模型开始。
www-128.ibm.com
1.
When you are finished designing your security model, you can export it to a file for import later using the Administration Console.
安全模型设计结束后,您可以将它导出到一个文件,以便稍后使用AdministrationConsole导入。
www.ibm.com
2.
The owner of the state is responsible for initiating the transitions, so drives the security model of the application (also see Figure 5).
状态的所有者负责发起转换,从而驱动应用程序的安全模型(也请参见图5)。
www.ibm.com
3.
It is recommended that you use a separate report server if your security model includes Basic authentication.
如果您的安全模式包含基本身份验证,建议您使用单独的报表服务器。
msdn2.microsoft.com
4.
Both the DB2 and IDS security model consist of two main components: authentication and authorization.
DB2和IDS安全模型都由两个主要组件组成:身份验证和授权。
www.ibm.com
5.
Message-oriented middleware relies heavily on a perimeter security model.
面向消息的中间件非常依赖外围网络安全模型。
www.ibm.com
6.
If your application implements a security model on the local machine, you'd also need administrator privileges.
如果应用程序在本地计算机中实施安全模型,也会需要管理员权限。
msdn.microsoft.com
7.
Authorization defined by the enterprise security model.
由企业安全模型定义的授权。
www.ibm.com
8.
At first, described the definition and the security model of a hierarchical identity-based signature scheme.
首先叙述了分层的基于身份的签名的定义和安全模型;
www.ceps.com.tw
9.
On this foundation, the paper proposes an intrusion tolerant database security model based on trapping mechanism.
在此基础上,提出了一种基于诱骗机制的入侵容忍数据库安全模型。
www.edu-hb.com
10.
Then, users could navigate between secured and non-secured pages without breaking the security model.
然后,用户可以在安全页面和不安全页面之间导航而不会破坏安全模型。
www-128.ibm.com
1.
Changing the security model to Classic can result in unexpected access to shared files and DCOM components.
将安全模型更改为“传统型”可能会导致对共享文件和DCOM组件的意外访问。
207.46.16.251
2.
In the Policy column, find Network access: sharing and security model for local accounts and double-click on it.
在“策略”列中,找到“网络访问:本地帐户的共享和安全模式”并双击它。
msdn2.microsoft.com
3.
There are a number of other specifications in process to add to the Web service security model.
还有很多其他规范也正在被添加到Web服务安全模型。
www-128.ibm.com
4.
Dialog security must be configured manually according to the full security model.
必须根据完全安全模式手动配置对话安全模式。
msdn2.microsoft.com
5.
The security model of Android only allows programs to have their own data.
Android的安全模型只允许程序有自己的数据。
www.ibm.com
6.
You also explored Agavi's security model, and built a login system for user authentication that protects access to application resources.
您还探索了Agavi的安全模型,构建了用于验证用户的登录系统,以保护对应用程序资源的访问。
www.ibm.com
7.
You need to select the same database when you import your security model, as shown in Figure 15.
您需要在导入安全模型时选择相同的数据库,如图15所示。
www.ibm.com
8.
Groovy shares the same libraries, the same object model, the same threading model, and the same security model as Java.
Groovy与Java共享同样的库,同样的对象模型,同样的线程模型,同样的安全模型。
www.infoq.com
9.
For information about the permissions required by each agent, see Replication Agent Security Model.
有关每个代理所需权限的信息,请参阅复制代理安全性模式。
technet.microsoft.com
10.
From the role of the security model in the system, model definition, model exceptions, and the model realization and so on.
分别从安全模型在系统中的角色、模型定义、模型异常和模型实现等角度进行阐述。
www.ceps.com.tw
1.
The end to end security model would mean that all providers give access to all trusted requesting applications.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
www.ibm.com
2.
DSS Security Model supports Message Level Authorization.
分布式软件服务安全模型支持消息层授权。
www.infoq.com
3.
The choice of one country 's old- age security model is the cause of multiple elements.
一个国家农村养老保障模式的选择与固化是多种复杂因素相互影响的结果。
dictsearch.appspot.com
4.
There lies the power, and dangerous flaw, of the Web browser security model.
这展现了Web浏览器安全性模型的强大和危险之处。
www-128.ibm.com
5.
The diagram in Figure 2 outlines the security model used in the sample case management asset.
图2描述示例案例管理资产中使用的安全模型。
www.ibm.com
6.
This article touches on the various aspects and concepts of CM security model.
本文涵盖了CM安全模型所涉及的各个方面和概念。
www.ibm.com
7.
It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.
文中还介绍了DB2UDB安全模型,包括用户身份验证、用户和组授权以及超级用户。
www.ibm.com
8.
Repeat the steps you followed in this article to export, import, and enforce your security model.
重复本文中导出、导入和实施安全模型的步骤。
www.ibm.com
9.
The security model is 100% compatible with on-premise model but is limited to standard SQL authentication and logins.
其安全模型与本地模型完全兼容,但限制于标准的SQL认证与登录上。
www.infoq.com
10.
Because MIDP lacks a complete security model, some J2SE features are disabled in MIDP to minimize potential security risks.
因为MIDP缺少完整的安全性模型,所以在MIDP中禁用了一些J2SE特性以使潜在的安全性风险降到最低。
www.ibm.com
1.
For the Cube Server to enforce your security model when users execute queries, you need to add users to roles.
要使CubeServer在用户执行查询时实施安全模型,需要向角色添加用户。
www.ibm.com
2.
All these govern the overall security model of the system.
所有这些内容控制着系统的总体安全模型。
www.ibm.com
3.
The network security model has been developed from static defensive to dynamic defensive, and P2DR model is the representative model.
目前的网络安全模型已经从过去的静态防御发展到动态防御,而P2DR模型就是动态防御模型的代表。
www.edu-hb.com
4.
Does your application support a particular security model?
您的应用程序是否支持特殊的安全模型?
www-128.ibm.com
5.
Contains information that describes the Notification Services security model and how to implement security.
包含说明NotificationServices安全模式以及如何实现安全性的信息。
msdn2.microsoft.com
6.
The security model of IIS is at fault here.
IIS的安全模型这里有毛病。
ro2.php.net
7.
Method violated the security model of the language.
方法破坏了语言的安全性模型。
www-128.ibm.com
8.
In many ways RM just plugs in with whatever other security model is already in place.
RM可有多种方法、以插件方式在其他安全模型中工作。
www.infoq.com
9.
Describes how to set the security model for a device.
描述如何设置设备的安全模型。
msdn2.microsoft.com
10.
The security model is the core content in the trusted information system and the key field of the trusted computing research.
安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域。
www.dictall.com
1.
This administration is handled using MQ queue authorities, so there is a single security model for both queue managers and brokers.
这一管理任务由MQ队列权限处理,因此队列管理器和代理可以使用同一个安全模型。
www.ibm.com
2.
Is there a need to integrate the service security model with application or legacy security systems?
是否需要使用应用程序或遗留安全系统来集成服务安全模型?
www-128.ibm.com
3.
The replication security model has changed, allowing more control over the accounts under which replication agents run and make connections.
复制安全模式已更改,允许对运行复制代理和建立连接的帐户进行更多控制。
msdn2.microsoft.com
4.
To limit the cubes and members of a dimension that a role can access, you need to design and deploy a security model.
要限制角色可以访问的一个维度的多维数据集和成员,需要设计和部署一个安全模型。
www.ibm.com
5.
The replication agent security model allows fine-grained control over the accounts under which replication agents run and make connections.
用复制代理安全模式可以对复制代理运行和建立连接所用的帐户进行精细粒度的控制。
msdn2.microsoft.com
6.
The security model contains the rules for accessing OLAP objects.
安全模型包含访问OLAP对象的规则。
www.ibm.com
7.
Chapter 3: China's rural old-age security model analysis of the motives for innovation.
第3章:中国农村养老保障模式创新的动因剖析。
www.fabiao.net
8.
One safeguard that can be placed on any security model is graduated data access.
可应用于任何安全模型的一种防护措施是分级数据访问。
www.ibm.com
9.
It introduces combination information security model based on network and system security.
从网络和系统安全的角度介绍了一种信息安全系统的组合模型。
www.ceps.com.tw
10.
JAAS augments the access control security model defined in Java 2 by adding subject-based policies.
JAAS通过添加基于subject的策略加强了Java2中定义的访问控制安全性模型。
www.ibm.com
1.
Discusses the security model of CLR integration.
讨论CLR集成的安全模型。
msdn2.microsoft.com
2.
Participants in a replication topology running previous versions of SQL Server retain the previous replication security model unchanged.
对于运行SQLServer早期版本的复制拓扑的参与者,原复制安全模式保持不变。
msdn2.microsoft.com
3.
The hub-and-spoke topology breaks this security model.
中心和分支拓扑打破了这种安全模型。
www.ibm.com
4.
Network security warning system based on "dynamic adaptive security model"
基于“动态自适应安全模型”的网络安全预警系统
service.ilib.cn
5.
Chapter 2: China's rural old-age security model analysis of the status quo.
第2章:中国农村养老保障模式的现状分析。
www.fabiao.net
6.
After you tell the Cube Server to reload security, it will authorize users according to the policies in your security model.
CubeServer重新加载安全性后,它将根据安全模型中的策略对用户授权。
www.ibm.com
7.
The security model for static SQL is also different than for dynamic SQL.
静态SQL的安全模型也不同于动态SQL的安全模型。
www.ibm.com
8.
See the Security Model section for more information.
更多的信息请查看安全模块部分。
blog.sina.com.cn
9.
Perhaps the most common complaint about the J2EE-defined declarative security model is that it is not sufficiently granular.
也许关于J2EE定义的声明性安全模型的最常见的抱怨是它没有提供足够的粒度。
www.ibm.com
10.
Add access restriction to multiple Web resources using the J2EE security model.
利用J2EE安全性模型向多个Web资源添加访问限制。
www.ibm.com
1.
The resulting security model is shown on the right side of Table 1.
生成的安全模型显示在表1右边部分。
www.ibm.com
2.
You can use the JEE security model for authorization either declaratively or programmatically for both servlets and EJBs.
您可以通过声明或编程的方式对servlet和EJB使用JEE安全模型以实现授权。
www.ibm.com
3.
We model the insider attack to further strengthen the tripartite eCK security model so that it can resist the insider attack.
我们形式化地对内部人攻击进行建模,进一步增强了三方eCK安全模型,使之能够抵抗内部人攻击。
www.13191.com
4.
As a result, today's IT security model is more about risk management than network protection.
因此,今日的IT安全模型更像是风险管理而非网络保护。
www.bing.com
5.
The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.
J2EE安全模型以方法权限为基础,因此对于细粒度的安全访问来说,它既不切实际又很麻烦。
www.ibm.com
6.
The third part analyzes the status of old-age security model in Chinese city.
第三部分分析我国目前城市养老模式的情况。
www.qk114.net
7.
Figure 1 provides an overview of the DB2 UDB security model.
图1是DB2UDB安全模型的概述。
www.ibm.com
8.
The security model has changed in SQL Server 2005, and these scripts must be updated.
在SQLServer2005中安全模式已更改,因此必须更新这些脚本。
msdn2.microsoft.com
9.
With DB2 9. 7, the security model has been enhanced to allow for separation of duties.
在DB29.7中,安全模型已经增强,允许职责分离。
www.ibm.com
10.
You might need to modify or re-export the security model if you modify your cube model by, for example, deleting or renaming dimensions.
如果您修改了多维数据集模型(比如删除或重命名维度),您可能需要修改或重新导出安全模型。
www.ibm.com
1.
The replication agent security model has changed significantly from SQL Server 2000.
从SQLServer2000开始,复制代理安全模式已发生重大变化。
msdn2.microsoft.com
2.
Determine the security model for connecting to SQL Server.
确定用于连接到SQLServer的安全模式。
technet.microsoft.com
3.
XML schema collections can be secured like any SQL object by using the security model in SQL Server 2005.
可以通过使用SQLServer2005中的安全模式像任何SQL对象那样保证XML架构集合的安全。
msdn2.microsoft.com
4.
You can alter the security model that is used.
可以更改使用的安全模型。
office.microsoft.com
5.
The permissions model of Exchange Server 2003 relies completely on the Microsoft Windows security model.
ExchangeServer2003的权限模型完全依赖于MicrosoftWindows安全模型。
technet.microsoft.com
6.
Decision on a Common Comprehensive Security Model for Europe for the Twenty-First Century: A New Concept for a New Century;
关于二十一世纪欧洲共同全面安全模式的决定:新世纪的新概念;
www.powerdict.com
7.
Research on an Application Class Communication Security Model on Operating System Security Framework
操作系统安全结构框架中应用类通信安全模型的研究
www.ilib.cn
8.
Study of Information Security Model for Extended Services of China Railway Ticketing and Reservation System
客票系统延伸服务信息安全模型的研究
www.ilib.cn
9.
Research on information security model for services oriented enterprise integration architecture
面向服务的企业集成体系中信息安全模型研究
ilib.cn
10.
The Technology Analysis and an Effective Solution for Network Security Model for Network Separation
网络隔离的技术分析与安全模型的改进方案
www.ilib.cn
1.
Lisbon Declaration on a Common and Comprehensive Security Model for Europe for the Twenty-first Century;
关于二十一世纪欧洲共同全面安全模式的里斯本宣言;
www.sinobay.com
2.
Formalized Description of a Security Model for Firewall Systems
一种防火墙系统安全模型的形式描述
www.ilib.cn
3.
A Security Model Integrating Firewall and Intrusion Detection System in Distributed Network Environment
分布式网络环境下集成防火墙和入侵检测系统的安全模型
ilib.cn
4.
Security model improvements, including Doors API for communicating between high and low privilege Flash content
安全模型改进,包括用于高、低安全级的Flash内容间通讯的DoorsAPI
www.infoq.com
5.
Research and Implementation of a Web Services Security Model
Web服务安全模型研究与实现
www.ilib.cn
6.
Construction of Enterprises Network Information Security Model
构筑企业信息网络安全模型
www.ilib.cn
7.
Study of the E-business security Model of Daqing Oilfield
大庆油田电子商务安全模型研究
service.ilib.cn
8.
Research and Design of a Security Model of Workflow Access Control
一种工作流访问控制安全模型的研究与设计
service.ilib.cn
9.
Kernel-level security model of component-based and dynamically extensible operating systems
构件化动态可扩展操作系统的内核安全模型
www.ilib.cn
10.
Security Model and Application of Logistics Information Management in the Environment of Networks
网络环境下物流信息管理安全模型和应用研究
www.ilib.cn
1.
The Strategy Structure Contrast between China and Japan Rising and Their Mutual Security Model Analysis
中日崛起的战略框架比较及其安全互动模式选择
www.ilib.cn
2.
Studies on the application of dynamic network security model in petrochemical enterprises
动态网络安全模型在石化企业的应用
www.ilib.cn
3.
Analysis and Design of a Web Service Provider Security Model
Web服务提供方安全模型的分析与设计
service.ilib.cn
4.
www.bing.com
5.
A Security Model on E-Governance and Its Security Component System Design
电子政务安全模型和安全组件系统设计
www.ilib.cn
6.
Construction of Community Health Service Security Model of the Laid-off Worker's Family
下岗职工家庭社区卫生服务健康保障模式的构建
www.ilib.cn
7.
Research on Database Security Model and Its Application
数据库安全模型及其应用研究
www.ilib.com.cn
8.
FSM Key words : middleware security ; security model ; middleware security architect ure ; fo rmal met hod ; finite state machine
关键词:中间件安全性;安全模型;体系结构;有穷状态自动机
wenku.baidu.com
9.
A Global Security Model Applied in Security Management Platform--Posture-Diagram Model
一种应用于安全管理平台的整体安全模型--态势图模型
service.ilib.cn
10.
Research on Information Transmission Security Model and Implementation Technology of Network-manufacturing Platform Based on XML
一种基于XML的网络化制造平台信息传输安全模型及实现技术研究
ilib.cn
1.
Common and Comprehensive Security Model for Europe for the Twenty-First Century;
欧洲二十一世纪共同和全面安全模式;
www.powerdict.com
2.
Design and Implement of Application Security Model in Grid Computing Environment
网格计算环境中的应用安全模型设计与实现
service.ilib.cn
3.
The Technologies Analysis and Network Security Model Application for Network Separation
网络隔离的技术分析与安全模型应用
www.ilib.cn
4.
Import certificates Query for security model Sign files Provision devices more
导入证书查询安全模型给文件签名提供设备更多
msdn2.microsoft.com
5.
Trusted Computing-Based Security Model for Software Protection
支持可信计算的软件保护模型
service.ilib.cn
6.
Intrusion Detection-based Research on Database Security Model
基于入侵检测的数据库安全模型研究
www.ilib.cn
7.
Dual system and document level security model to enable highly secure information exchange, inside and outside the firewall
建立双重的系统及文档级别的安全模型使得防火墙内外都能进行高度安全的信息交换
www.ibm.com
8.
Research on information security model and security system design
信息安全模型的研究及安全系统方案设计
www.ilib.cn
9.
Research on Security Model of XML Engineering Drawings Management
基于XML的工程图档管理安全模型的研究
www.ilib.cn
10.
Intelligent information security model for remote bank
远程银行智能信息安全模型
www.ilib.cn
1.
A Directory-Based Security Model of SNMP Management Data in Enterprise Networks
基于目录服务的企业网SNMP管理数据安全模型
www.ilib.cn
2.
Design and Research of the Network Security Model of the Active Defense
一种基于主动防御网络安全模型的设计与实现
www.ilib.cn
3.
Object Petri Nets'Application in Information Security Model
对象Petri网在信息安全建模中的应用
www.wanfangdata.com.cn
4.
Study on an Integrated Security Model for Web Services Based on Mechanism of Post Offices
基于邮局机制的Web服务安全集成模型的研究
ilib.cn
5.
A Multi-Level Security Model with Least Privilege Support for Trusted Subject
一个支持可信主体特权最小化的多级安全模型
www.ilib.cn
6.
Research on Security Model for Industrial Control Networks
工业控制网络安全模型研究
www.ilib.cn
7.
Research on security control of information security model
信息安全模型安全控制研究
service.ilib.cn
8.
To provision a device with a security model
为设备提供安全模型
msdn2.microsoft.com
9.
Dynamic Defense Security Model for Network Perimeter
网络边界安全的动态防护模型
www.ilib.cn
10.
Extension and Application of Military Security Model
军用安全模型扩展及其应用
service.ilib.cn
1.
Node Security Model in Active Distributed Accounting
主动分布计费中的节点安全模型
service.ilib.cn
2.
The study of building new cooperation medical service security model in Ningxia rural area
宁夏建立新型农村合作医疗保障模式的研究
www.ilib.cn
3.
Research of Network payroll Security Model of Digital hospital
数字医院的网上支付安全模式的研究
ilib.cn
4.
An Exploration to the Social Security Model for Rural Area and Farmer's Families
中国农村家庭养老与社会养老模式探析
ilib.cn
5.
Hierarchy security model for networked storage
存储网层次安全模型的研究
www.ilib.cn
6.
Network access: Sharing and security model for local accounts
网络访问:本地账户的共享和安全模式
wenwen.soso.com
7.
Security Model for Mobile Systems with Location Failures
考虑位置失效的移动系统安全模型
ilib.cn
8.
Technology Analyse And Application of Security Model For VPN
VPN技术分析及安全模型的应用
ilib.cn
9.
Basal View and Visceras of Oldie Security Model in Chinese Country-sides
论中国农村养老保障模式创新的基本视角和内容
www.ilib.cn
10.
Analysis and Improvement of the IP Security Model
IP安全协议模型的分析与改进
service.ilib.cn
1.
A Security Model for Cryptographic Protocols
密码协议的一种安全模型
www.ilib.cn
2.
Concepts and Application of Five-layers Security Model
五层安全模型的概念及应用
www.ilib.cn
3.
Access Technologies And Security Model Of Web Database
Web数据库访问技术及安全性研究
zhidao.baidu.com
4.
Research of Multilevel Security Model in Database
数据库多级安全模型的研究
www.ilib.com.cn
5.
Case Methods for Building Web Services Security Model
Web服务安全性模型构建的案例分析方法
www.ilib.cn
6.
Research on Operating System Security Model
操作系统安全模型研究
www.ilib.cn
7.
Network security model of power enterprise based on intrusion tolerance technology
基于容侵技术的电力企业网络安全体系模型
www.ilib.cn
8.
Construction of Security Model of Electronic Government Affair Based on Digit Watermark
电子政务的数字水印技术安全模型
www.ilib.cn
9.
A Distributed Security Model for Campus Network
一个分布式园区网络安全防御系统模型
www.ilib.cn
10.
A Uniform Framework of Security Model for Mobile Systems
可移动系统安全模型统一框架
www.ilib.cn
1.
The Security Mechanism of iFIX and the Industrial Control Network's Three-layered Security Model
iFIX的安全机制及其工控网络三层安全模型
www.ilib.cn
2.
For detailed information about the agent security model, see
有关代理安全模式的详细信息,请参阅
msdn2.microsoft.com
3.
A Computer Security Model of Imitated Nature Immune
一种仿生物免疫的计算机安全系统模型
ilib.cn
4.
On the Government's Functions in the New Social Security Model for the Aged in the Countryside of China and the Terraced Payment Mechanism
论中国农村新型养老保障模式中政府作用与梯度缴费机制
www.ilib.cn
5.
Powerful role and context based security model
基于强大角色和环境的安全模型
www2.navis.com
6.
Extension to Military Security Model
对军用安全模型的扩展
ilib.cn
7.
Multi-layers Digital Monitoring Network Security Model Based on Seal Combination
基于封装组合的多级数字监控网络安全模型
service.ilib.cn
8.
For detailed information about the security model, see
有关安全模型的详细信息,请参阅
msdn2.microsoft.com
9.
A Security Model for Online Accessing to Share Devices
一种支持网上共享设备的安全模型
www.ilib.cn
10.
Security Model Research Based on the Networked Manufacturing ASP Platform
基于网络的ASP服务平台安全模型的研究
www.ilib.cn
1.
Research of Pivotal Policy in Grid Security Model
网格安全模型中关键策略的研究
www.ilib.cn
2.
Research on Database Security Model
数据库安全模型的研究
www.ilib.cn
3.
Study on the Internet Banking Security Model
网上银行安全风险模式的研究
ilib.cn
4.
An Analysis of Security Model for Data Warehouse
数据仓库安全模型分析
www.ilib.cn
5.
The following components are needed in order to provision the device with a security model
要为设备提供安全模型,需要以下组件
msdn2.microsoft.com
6.
A Security Model Based on Architecture Research in Application Area Boundary
基于应用区域边界体系结构的安全模型
www.ilib.cn
7.
An Information Security Model Based on Fuzzy Synthesis Evaluation
一种模糊综合评判的信息安全评估模型
www.ilib.cn
8.
Research of Security Model in Information Integration Based on Multi-Agent
基于多代理的信息集成的安全模型研究
www.ilib.com.cn
9.
Design of Peer-To-Peer Communication Network Security Model based on IP Technology
基于IP技术的端对端通信网络安全模型分析设计
service.ilib.cn
10.
Research on Security Model in Ad hoc Networks
网络安全模型的研究
www.ilib.cn
1.
The Design and Analysis of WAP Security Model
WAP安全模型的设计与分析
ilib.cn
2.
The security model of medical database in LAN
局域网上医学数据库的安全模型
service.ilib.cn
3.
The Research and Design of Security Model
操作系统安全模型研究及方案设计
www.ilib.cn
4.
The Study on Constructing Zhejiang Freeway Online-Network System Security Model
浙江省高速公路联网系统安全模型构建的研究
scholar.ilib.cn
5.
A New Security Model for SOAP Attachments
一种新型SOAP消息附件安全保障模型
www.ilib.cn
6.
A Network Security Model Based on Maximum Degree of Membership
基于最大隶属度的网络安全模型
scholar.ilib.cn
7.
Realization of Network Security Model Based on Immunity in Multi-agent
利用多代理实现基于免疫的网络安全模型
www.ilib.cn
8.
Research on a Security Model Based on Web Services Message Level
一个Web服务消息级别的安全模型研究
service.ilib.cn
9.
Security Model Design for Web Based MIS
基于Web的管理信息系统的安全模型设计
service.ilib.cn
10.
An Automatic-Recovery Security Model Based on Allied Backup
基于联盟备分的自动恢复安全模型研究
www.ilib.cn
1.
To query a device for its security model
向设备查询其安全模型
msdn2.microsoft.com
2.
File system security model based on lineage mechanism
基于血统机制的文件系统安全
service.ilib.cn
3.
Security Model Based on Role Administration
基于角色管理的安全模型
service.ilib.cn
4.
Design of Cooperated Security Model Based on Firewall and IDS
防火墙与入侵检测系统结合的安全模型设计
ilib.cn
5.
Network Security Model Based on Auti-Hacker Practise
一个基于反黑客实践的网络安全系统理论模型
www.ilib.cn
6.
A Data Security Model in E-Commerce
电子商务中一种数据安全模型
www.ilib.cn
7.
The Study and Implementation of Grid Computing Security Model
网格计算安全模型的研究与实现
service.ilib.cn
8.
A Security Model of E-Commerce Based on Intelligent Agent
基于智能代理的电子商务安全模型
www.ilib.cn
9.
A Distributed Security Model Based on Divide and Rule
一个基于分权机制的分布式网络安全系统模型研究
service.ilib.cn
10.
Grid security model based on enterprise grid
一种基于企业网格的网格安全模型
www.ilib.cn
1.
A generation tool of test case based on the security model
一个基于安全模型的测试用例生成工具
www.ilib.cn
2.
The Research in Security Model of E-Commerce Based on PKI
基于PKI的电子商务安全模型研究
www.ilib.cn
3.
The new security model has the following implications for upgrading and running more than one version of SQL Server in a topology
新的安全模式对于在拓扑中升级和运行SQLServer的多个版本具有下列含义
msdn2.microsoft.com
4.
The security model of CSCW system based on RBAC
基于角色的CSCW系统安全模型
ilib.cn
5.
Aging Problem in China's Rural Area and Options for Its Social Security Model
我国农村人口老龄化及其养老社会保障模式的选择
ilib.cn
6.
You should re-export and re-import your security model if you do the following
如果执行以下操作,则需要重新导出和重新导入安全模型。
www.ibm.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/2/7 3:32:32