助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   安全对象 的翻译结果: 查询用时:0.899秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

安全对象
相关语句
  security object
     If the database is managed through the security object based on the idea of CORBA, not only increases the security of database, but also presents a solution proposal for the standard of database security mangment.
     采用基于CORBA的数据库安全对象来实现对数据库的统一管理,不仅提高了分布式数据库的安全性,而且对WEB数据库的安全管理的统一标准化提出了解决方案。
短句来源
     In this paper,Mandatory Access Control(MAC) in Object Relational Database Management System(ORDBMS)is discussed. Based on the concepts and features associated with security object in DaMeng ORDBMS,the policy of labelling objects and filtering objects in MAC is presented,and the constraints policy of filtering objects is discussed emphatically.
     论文研究了对象关系数据库管理系统的强制访问控制,在达梦对象关系数据库管理系统的安全对象概念及其对象特性的基础上,给出了标识对象安全级的策略和过滤对象的访问控制策略,重点讨论了过滤对象的约束策略。
短句来源
     This model of B-level security kernel(BSK) is used to highlight security level in the traditional reference monitor model and Bell-Lapadula model. BSK presents security object notation based three classes of object and message dispatch model.
     BSK对监控器和BLP模型进行扩充,借鉴Mach消息传递机制,采用面向对象机制,提出了基于安全对象安全对象模型和消息调度模型,并且给出了BSK消息调度算法。
短句来源
  secure object
     The Signature Technique of Secure Object in Distributed Environment
     分布式环境中的安全对象签名技术
短句来源
     From the point of view of object-oriented technique, this paper proposes the method of how to build secure object using signature in distributed environment in order to improve the efficiency of security management and the safety of resources.
     从面向对象的角度出发,提出在分布式环境中,如何利用签名技术来建立安全对象,从而提高安全管理效率及资源安全性的方法。
短句来源
     The information records,which may be suspicious intrusion information,were dynamically transferred to a secure object 'M',in which every key file had a corresponding image.
     可能包含入侵踪迹的信息记录都被动态地转移到安全对象M中,每种关键文件在M中都存在一个对等的映像,用来存储安全转移过来的信息记录.
短句来源
  “安全对象”译为未确定词的双语例句
     Research on the Framework of CORBA Security Models
     CORBA安全对象系统模型框架研究
短句来源
     Secure-Object is based on the normal network object It results from theintegration of security and network objects.
     安全对象(Secure Object)是建立在普通网络对象的基础上,通过将安全属性和网络对象集成而得到。
短句来源
     With the technology ofenciyption and digital signature, the signature is given to the ACL, secureproperty by the owner of the object in order to create a complete Secure-Object.
     具体实现是结合数据加密技术和签名技术,对其中的访问控制表、安全属性等内容由对象拥有者进行数字签名保护,从而构造了完整的安全对象
短句来源
     An easier and less costly security application of SNMP is implemented through adding the secure objects to the MIB to control the application software.
     为此,通过在MIB库中加入安全对象对SNMP应用软件进行控制,实现了一种可以接受的简单灵活、开销小的安全应用机制———ASS(ApplicationSecureSNMP)。
短句来源
     CIST consists of many security objects, these objects include device objects user object, certificate object, keyset object context object, envelope object and session object , they provide security sevices for superstratum applications and users together.
     CIST是由各种安全对象组成的,这些对象包括设备对象、用户对象、证书对象、密钥集对象、上下文对象、信封对象和会话对象,这些对象共同为上层应用和用户提供安全服务。
短句来源
更多       
查询“安全对象”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  security object
A Security object may be used to represent a hypothetical security, with attribute values filled in by the application program.
      
However, the Security object plays an important role in this system.
      
The tester shall validate that the SignedData content type includes the digital signature corresponding to the signed security object.
      
  security classes
Our adaptive secure methodology dynamically adapts security classes based on the nature and sensitivity of interactions among participants.
      
The security classes incorporate security levels of cryptographic techniques with a degree of information sensitivity.
      
For each holding period, stochastic dominance tests are run to establish preferences between the alternative security classes.
      
As explained in Section 2.4.1.1, fixed variable security classes induce a large number of false positives.
      
Currently, Orange County water professionals' options for water infrastructure security classes are somewhat limited.
      
更多          
  secure object
An exception is also raised if a secure object is accessed without the authentication step.
      
DisCo utilizes Switchboard's facilities for secure object delivery, RPC, and code distribution.
      
It manages the secure object storage system, interface protocol and parameters, interprets and executes external commands.
      
Next, we introduce the CORBAgate architecture showing how it provides a secure object gateway for firewall machines.
      
The importance of these functions as enablers of secure object authentication approaches can be clearly seen in Table A-1.
      
更多          


The global security system for open distributed processing(ODP)environment consists ofsecurity domains associated with security association.Because of the complex of relationship betweensecurity domains and the complex of architecture of the global security system,both the organization and the management of the global security system are very important.This paper presents three types of topologicalarchitectures(net topological,tree topologleal and combination topologcal)of the global security system. Onthe basis...

The global security system for open distributed processing(ODP)environment consists ofsecurity domains associated with security association.Because of the complex of relationship betweensecurity domains and the complex of architecture of the global security system,both the organization and the management of the global security system are very important.This paper presents three types of topologicalarchitectures(net topological,tree topologleal and combination topologcal)of the global security system. Onthe basis of the sets of objects and the sets of security policies,the characters of every type topologcalarchitecture are diseussed,and the construction conditions of the topological architecttires are presented inthis paper.The topological architectures are helpful for organzing and managing the global security system.

ODP环境中的全局安全系统是由各个安全域通过安全联接而成的,但是安全域之间的关系、全局安全系统的结构却是错综复杂的,组织和管理好全局安全系统是一个非常重要的问题。文中提出了全局安全系统的三种拓扑结构:网状拓扑、树状拓扑和综合拓扑,并根据安全政策和安全对象,讨论了各种拓扑的特点和构成条件。

Model indentification is the base of analyssing system and improving design of mechanical and electrical equipment.The closed-loop experiment is one more simple and more accurate than the other classical methods is used to measure a plant character.Bassing the dampping response curve and it's some characteristical parameters,The mode order and the constructional parameters value can be computered by ussing a especial program.The method have been widely appicable signficance,that is proven by simunational experiment....

Model indentification is the base of analyssing system and improving design of mechanical and electrical equipment.The closed-loop experiment is one more simple and more accurate than the other classical methods is used to measure a plant character.Bassing the dampping response curve and it's some characteristical parameters,The mode order and the constructional parameters value can be computered by ussing a especial program.The method have been widely appicable signficance,that is proven by simunational experiment.

模型测试是系统分析及改进机电设备的设计基础。闭环测试是一种既简单又安全的对象特性测试方法。在测试闭环衰减响应曲线的基础上,由测取若干响应曲线的特征数据,便可以求出对象模型的的阶次与结构参数,并由专用程序加以计算,仿真结果与实验数据经专用程序计算的结果完全一致,说明本方法有广泛的实用价值

From the point of view of object-oriented technique, this paper proposes the method of how to build secure object using signature in distributed environment in order to improve the efficiency of security management and the safety of resources.

从面向对象的角度出发,提出在分布式环境中,如何利用签名技术来建立安全对象,从而提高安全管理效率及资源安全性的方法。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关安全对象的内容
在知识搜索中查有关安全对象的内容
在数字搜索中查有关安全对象的内容
在概念知识元中查有关安全对象的内容
在学术趋势中查有关安全对象的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社