security model 中文意思是什麼

security model 解釋
安全模型
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • model : n 1 模型,雛型;原型;設計圖;模範;(畫家、雕刻家的)模特兒;樣板。2 典型,模範。3 (女服裝店僱...
  1. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。
  2. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    入侵檢測分析技術是入侵檢測系統的核心,主要分為異常入侵檢測和誤用入侵檢測。作者在對傳統網路安全模型、 ppdr模型、入侵檢測原理以及常用入侵檢測技術進行比較分析的基礎上,提出了一個基於遺傳神經網路的入侵檢測方法,採用遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統的bp演算法的收斂速度慢、易陷入局部最小點的問題。
  3. Com or unmanaged assembly routines do not support the clr security model

    Com (或非託管)程序集常式不支持clr安全模式。
  4. Ajax has a sandbox security model

    Ajax採用一種沙箱安全模型。
  5. This thesis is based on a mobile e - business system - mobile auction system, which adopts the j2me ? and web service technologies. after comprehensive research work upon the web service security and j2me security technologies, i bring forward a security model, and implemented it in the mobile auction system

    本文主要通過利用j2me和web服務技術相結合實現的一個移動電子商務應用- - - -移動電子拍賣系統中的安全性實踐,針對當前web服務平臺上的安全性規范和j2me平臺上安全應用的研究,提出了一個安全實現的模型,並在移動電子拍賣系統中進行了實踐。
  6. The sql server clr integration security model is intended to govern code executing inside of sql server, and is intended to prevent elevation of privilege attacks against protected system resources from managed code

    Sql server clr集成安全模型旨在控制在sql server內部執行的代碼,並避免通過託管代碼對受保護的系統資源進行特權升級攻擊。
  7. On the basis of dns security model, we accomplished a dns security platform - dnsspf, which adopts hierarchy and modularity thinking and is composed of three layers and six modules. the special kind of structure make the entire system is of strong cohesion and low coupling feature

    在dns安全防護模型思想的基礎上,本文實現了一個dns安全防護平臺? dnsspf ,該平臺採用層次化和模塊化設計思想,將整個系統分為三個層次和六大模塊,使系統具有高內聚和低耦合的特點。
  8. Information technology - open systems interconnection - upper layers security model

    信息技術開放系統互連高層安全模型
  9. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  10. According to hiberarchy security model of information system, osgw system is partitioned into four layers, forcibly implemented with hardware - based security and protects data through internet ; 2, to recieve and forward the oracle data packets, we put forward a promethean method of service renaming which makes it possible to enhance the oracle ' s security ; 3, after finishing the analysis of security demand, the gateway implements seveval kinds of security policy model and this make the gateway may be applied in sorts of condin ' on ; 4, the syntax of subject and object label is flexible and helps to scheme these labels, which is pioneer in correlative fields ; 5jby blacklist the osgw filtrates some loggin request based on accounts, host and applications. the blacklist subsystem strengthens the availability and performance of the gateway system

    黑名單系統在中間層實現了基於客戶身份,客戶主機和客戶應用程序的安全過濾,增強了系統的可用性和性能。本文的主要工作包括設計並實現osgw安全系統和osgw安全信關兩個部分。 osgw安全系統關注的是從物理層,軟體層和inetert層實現oracle系統的安全性; osgw安全信關本質上是osgw安全系統的軟體層, osgw安全系統的b級安全特性由osgw安全信關來實現。
  11. In this security model, mobile agent uses different itinerary patterns, security policies and reputation management to reduce the risk in e - commerce as much as possible and make the transactions of e - commerce more efficient

    在所研究的安全模型中,移動代理使用不同的訪問策略、安全機制以及信用管理措施來盡可能地降低在電子商務環境中所遭受到的風險,同時利用移動特性來提高交易的效率。
  12. First, by analysing the disadvangtages of the decomposition and recovery algorithm in the usual security model, a new algorithm of double structure tables, which is suitble for master - slaver structure tables, is presented in this paper. second, in resolving the semantic ambiguity and operational incompleteness easily emerged in master - slaver structure tables, an improved master - slaver structure table model and relative decomposition and recovery algorithm are provided. third, considering the merits and demerits of security model, a multilevel secure transaction model is defined on the basis of security model

    本文通過分析以往安全模型的分解和恢復演算法的缺點,提出了一個適合於主從結構表這種雙結構表安全模型的分解和恢復演算法;針對主從結構表安全模型容易產生語義模糊性和操作不完備性等問題,提出了一個改進的主從結構表安全模型,並提出了其分解和恢復可行方法;討論了安全模型的優缺點,定義了建立在安全模型基礎之上的多級安全事務模型,分析了多級事務面臨的眾多難題,提出了一個安全、正確的多級事務調度演算法;根據上述的諸多理論,開發了一個多級安全數據庫管理系統的原型系統。
  13. A published report is secured through role assignments using the reporting services role - based security model

    發布的報表是通過角色分配進行保護的,這種角色分配使用的是基於reporting services角色的安全模式。
  14. According to the fundamental theory of security of cryptographic system, the security of various structural encryption algorithms is researched and security model is designed in paper

    本文從密碼系統的基本安全理論出發,致力於各體制加密演算法安全性的研究和安全模型的設計。
  15. For this, based on analyzing formalized design method, principles and architecture for designing formal model are proposed, then according to them, the model is designed hierarchically. first, a formal framework for supporting multipolicy is presented. second, some component models are constructed, including dynamically mediated security level rang multilevel security model dmlr - mls, which is used to implement confidentiality policy, and renamed as dblp model after it is combined with dac model, based - dte integrity protection security model dte - ipm, and privilege control model pcm - rbpc based on capability mechanism, role mechanism and dte privilege mechanism

    本文主要研究開發高安全等級的操作系統所必需的安全策略形式模型,為此我們從形式設計方法的探討入手,確定模型設計的基本原則及組織結構,然後根據確定的組織結構逐步展開設計,提出支持多策略的形式框架、實現機密性策略的可動態調節安全級范圍的多級安全模型dmlr _ mls (本文把它與dac模型合在一起形成dblp模型) 、基於dte技術實現完整性保護的形式模型dte _ ipm及基於權能、角色及dte的特權控制模型pcm _ rbpc 。
  16. The conc9pts and approaches relating to information security among the course of development of the ia are introduced. for example, reference monitor ( are ), reference validation mechanism ( rvm ), trusted computing base ( tcb ), security model, tcsec, cc, iatf fritsa, etc. chapter 2 analyzes the time and space property " of information security

    第一章對信息保障的歷史進行回顧,介紹在信息保障的發展歷程中有關信息安全的概念和方法,如:引用監視器( rm ) 、引用確認機制( rvn ) 、可信計算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。
  17. Firstly, it introduces the information security theories and technologies used in the study. the information security theories mainly includes ppdr - the dynamic security model, sse - cmm, padminee - the life cycle of information security engineering model, bs7799 - the standard of information security management, the grade - classification standard of information system security protection, iatf - the technical framework of information security guarantee and the principle of wooden pail etc. and the information security technologies consist of the technology of firewall, invasion detection, virus prevention and cure, loophole scanning, the identity certification and the soc etc. then it studies on the designing of the information security guarantee system

    首先,介紹和分析與本研究相關的主要信息安全理論與技術,其中信息安全理論有ppdr動態安全模型、 sse - cmm系統安全工程-能力成熟度模型、 padminee信息安全生命周期工程模型、 bs7799信息安全管理標準、信息系統安全保護等級劃分準則、 iatf信息安全保障技術框架和木桶安全理論等;信息安全技術有防火墻技術、入侵檢測技術、計算機病毒防治技術、漏洞掃描與評估技術、身份認證技術和soc技術等。
  18. At present, china ' s household electrical appliance industry, there are three typical third party logistics - - in the security model, antaida model changhong model

    目前,我國家電行業中存在著三種典型的第三方物流模式? ?安得模式、安泰達模式、長虹模式。
  19. In this dissertation the integrated and privilege - role extended unix operating system security model, which is based on the blp model, is discussed

    在對blp模型進行分析的基礎上,提出了以blp模型為基礎的完整性和特權角色擴展的unix操作系統安全模型。
  20. Then, the paper summaries disadvantages of traditional concurrency controls under multilevel security condition and introduces multilevel security dbms concurrency control. after summarizing the related research work, we present a multi level transaction model to solve the convert channel and starvation problems in concurrent control under blp multi level security model

    本文首先分析了傳統的數據庫並發控制各自存在的優缺點,總結了傳統並發控制在多級安全條件下存在的問題,由此引出了多級安全數據庫並發控制機制。在總結了已有的研究基礎上,針對blp多級安全模型下並發控制產生隱通道和饑餓問題,本文提出了一種多級事務模型- - - nhstm模型。
分享友人