security policies 中文意思是什麼

security policies 解釋
安全性策略
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • policies : 如策略
  1. Partial security policies to support timeliness in rtdbs

    支持實時數據庫的局部安全性策略
  2. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  3. Finally, through analyzing the demands of e - government of ezhou. the paper establishes the function module of document flow system. take sending and receiving file administration systems for example, security policies are applied and realized in the system after they are researched

    在對鄂州市電子政務系統進行需求分析的基礎上,確立了公文流轉系統的功能模塊,並在系統開發中對安全策略進行設計與研究,以收文管理模塊和發文管理模塊為例介紹了安全策略的具體應用與實現。
  4. Topics include installation, physical security, creating security policies, backups, authentication, firewalls, intrusion detection, and network security

    其主題包括:安裝、物理安全性、創建安全策略、備份、認證、防火墻、入侵偵測和網路安全性。
  5. In your production security extension implementation, you should create strong - named assemblies and use the strong name membership condition when adding security policies for your assembly

    在生產安全性擴展插件的實施過程中,當為程序集添加安全性策略時,應創建具有強名稱的程序集,並使用強名稱成員身份條件。
  6. ( 2 ) research on ipsec architecture the goal, function and construction of ipsec design ; the analysis on the two security protocols of ipsec ? ah and esp including security function, packet format, application mode and processing operations of each ; mainly of the security association ( sa ) and its two modes : transport and tunnel, the instrument on organizing and managing sas security association database ( sad ), and that on managing security policies ? ? security policy database ( spd ) ; specific descriptions on internet key exchange ( ike )

    ( 2 ) ipsec協議體系的研究給出了ipsec的設計目的、作用和組成;分析了ipsec的兩種安全協議? ? ah和esp ,包括每種協議的安全功能、包格式、應用模式以及對數據包的處理過程;重點研究了安全聯盟( sa )以及兩種模式:傳輸模式和隧道模式,組織和管理sa的手段? ?安全聯盟數據庫( sad ) ,以及安全策略的管理手段? ?安全策略數據庫( spd ) ;最後,對internet密鑰交換( ike )進行了詳細介紹。
  7. These states include good state, vulnerable state, degradation state and failed state. there are difference security policies according different state

    我們把網路系統的安全狀態分為四個等級:正常狀態、易受攻擊狀態、服務退化狀態和被攻擊狀態,它們分別對應著不同的安全策略。
  8. Theoretical enlightenment of reforms in social security policies in western countries

    西方社會保障政策改革的理念啟示
  9. A discussion on the social security policies of informal employment group in our country

    我國靈活就業群體的社會保障政策探討
  10. In this security model, mobile agent uses different itinerary patterns, security policies and reputation management to reduce the risk in e - commerce as much as possible and make the transactions of e - commerce more efficient

    在所研究的安全模型中,移動代理使用不同的訪問策略、安全機制以及信用管理措施來盡可能地降低在電子商務環境中所遭受到的風險,同時利用移動特性來提高交易的效率。
  11. School administrators across the country are re - examining their security policies and communications systems

    全國的學校管理者都在重新檢查他們的安全政策和通訊系統。
  12. All content must be tagged with content attributes and metadata, including those for security policies, by content administrators and portal administrators

    內容和入口網站管理員必須使用內容屬性和元資料(包括用於安全策略的內容屬性和元資料)標識所有內容。
  13. This thesis introduces the background about this system and solving path at first ; then emphasises to describe ideas and implementation of clustering - algorithm ; furthermore expands on the characteristics and flows of each module ; analyses how to establish security policies ; finally summary full text, and suggest further works, otherwise, it also make point of personalizing hyperlinks and personalizing search - engines based on web data mining, making personalizing application more integrate

    本文首先介紹了論文所提問題的背景和解決途徑;然後說明了本系統的概念定義和目標;重點介紹了系統中聚類演算法的思想和實現;進而詳細闡述了系統各個功能模塊的特徵和流程;分析了如何通過服務器日誌建立安全策略;最後進行了總結,並提出了下一步的工作。此外,論文提出了個性化引擎、個性化鏈接與web數據挖掘的結合,使個性化應用更加全面。
  14. An internet firewall is often used to enforce security policies between an organization ' s network and the internet

    現在解決網路安全問題的一個有效方法就是在內部網和外部網之間設置防火墻。
  15. Implement security policies such as account locking, password age, and so on

    執行安全策略,例如帳戶鎖定、密碼期限,等等。
  16. To support national and international security policies that protect those who are defenseless and provide a free voice for all with a dedication to providing ethical, efficient, and effective turnkey solutions that positively impact the lives of those still caught in desperate times

    支持國家和國際安全政策,保護那些手無寸鐵的聲音,並提供一切免費以奉獻為德、高效交鑰匙積極影響和有效的解決辦法,還是那些生活陷入絕境
  17. National security policies

    國家安全政策
  18. The research fields of the paper are composed by two parts, one is the migration as a non - traditional security factor ' s influence upon national security in the stage of transnational population movements, the other is how the national security policies determining the movements of migration

    本文所探討的問題有兩個方面:一是跨國人口遷移所蘊涵的非傳統安全因素對國家安全的影響,即跨國人口遷移的安全意義;二是國家安全的狀態和政策取向對跨國人口遷移的形成與發展的作用。
  19. Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization

    第三,在深入研究多級安全模型、完整性模型、基於角色的授權模型等基礎上,首先提出了一個修改blp模型( mblp )的方案,並在一個自主開發的安全操作系統中得到了應用;然後通過將blp模型、 clark - wilson模型、 dte模型、 rbac模型有機地集成應用,提升出一個支持機密性、完整性和授權等多安全策略的,可實現動態授權的訪問控制模型( daacm ) 。
  20. Further improvement on the security policies and system optimization in railway operation network is also discussed in this thesis

    本論文還討論了設計實現過程中進一步完善鐵路內部運輸生產網的安全策略及系統優化問題。
分享友人