助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   企业安全策略 的翻译结果: 查询用时:0.226秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

企业安全策略
相关语句
  enterprise security policy
     In order to solve above two problems, a good method is to realize automation of the user-role assignment, which dynamically assigns user to role basing on user individual information and enterprise security policy, and does not need the security manager maintain and manage the user-role assignment.
     为了解决上面两个问题,一种较好的方法是实现用户-角色分配的自动化,即依据用户个人信息和企业安全策略,动态分配用户到角色,无需安全管理员对用户-角色分配进行维护和管理。
短句来源
     These authorized rules have considered the user attribute and the enterprise security policy.
     这些授权规则考虑了用户属性和企业安全策略
短句来源
  “企业安全策略”译为未确定词的双语例句
     Role-Based Access Control (RBAC) is an effective access control model for implement enterprise-oriented security policy .
     基于角色的访问控制(RBAC:Role-Based Access Control)是实施西向企业安全策略的一种有效的访问控制方式。
短句来源
     Because the traditional security strategies can't meet the new requirements, we propose a multi-layer firewall framework, and then propose a constrained access authentication model and describe the corresponding algorithms.
     由于传统的企业安全策略不能满足新的需求,本文提出了多层防火墙结构的一个安全框架,并且在此基础上提出了受限访问授权模型并给出了相应的算法描述。
短句来源
     The model also allows dynamic revocation of assigned roles based on conditions specified in the security policy.
     这个模型同样基于企业安全策略中的具体条件,允许动态撤销用户的角色。
短句来源
  相似匹配句对
     Safety Strategy of Network in Enterprise
     企业的网络安全策略
短句来源
     Security Tactics for Corporation Network System
     企业网络系统的安全策略
短句来源
     Safety Protection Strategy of Intranet
     企业安全防范策略
短句来源
     Tactics of Guaranteeing the Security of Enterprise Network
     打造企业网络安全策略
短句来源
     Safety Management Strategy of Enterprise Network
     企业网络安全管理策略
短句来源
查询“企业安全策略”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  enterprise security policy
This information gathering and reporting depends on the enterprise security policy and security network operations procedures.
      
This suggests that once a VPN is set up, it should be kept alive as long as allowed by the enterprise security policy.
      


Methods of data synchronization over different platforms are discussed. It gives an example to illuminate the implementation of data synchronization over different platforms using Socket communication based B/S module under enterprise security policy in the design of Intranet automatic tools. The method utilizes fully the characteristics and advantages of Socket communication technology. The client sends a section of names to be upgraded and the server finishes the searching operation using the existing database...

Methods of data synchronization over different platforms are discussed. It gives an example to illuminate the implementation of data synchronization over different platforms using Socket communication based B/S module under enterprise security policy in the design of Intranet automatic tools. The method utilizes fully the characteristics and advantages of Socket communication technology. The client sends a section of names to be upgraded and the server finishes the searching operation using the existing database tools and returns the new content. The local application program receives the new content and then update the local database, thus achieving the purpose of data synchronization over different platforms and different database types.

对当前跨平台数据同步的几种方法进行综合评价 .在企业安全策略的前提下 ,给出了一种基于 C/S模式的 Socket通讯系统框架 ,并给出了在 Intranet自动化工具中的实现方法 .该方法充分利用了 Socket技术的特点和优势 ,客户端发送需要更新的字段名称 ,服务器端利用已有的数据库查询工具完成查询操作 ,返回新的字段内容 .本地应用程序将接收到的新的字段内容对所需要与远端同步的数据库进行数据更新 ,达到了不同平台下不同数据库类型的数据同步

Role-Based Access Control (RBAC) is an effective access control model for implement enterprise-oriented security policy .This paper introduces the RBAC policies, and then takes the desgin procedure management system in shipyard as an example,and analyzes the security demand in the system.Factors of RBAC which fit the system are present-ed.Finally.a framework of implement RBAC is given.

基于角色的访问控制(RBAC:Role-Based Access Control)是实施西向企业安全策略的一种有效的访问控制方式。文章首先介绍了RBAC策略;而后在RBAC策略的指导下以舰船设计过程管理系统为例,详细分析了其安全需求,设计了适合该应用的多个RBAC元素;最后给出了一个具体实现RBAC的方案。

This paper describes a method of implementing R BA C(Role Based Access Control)based on X..509attribute certificate within c orporate intranet.This method achieves user authentication using PKC(Public Ke y Certificate),authorization using X.509Attribute Certificate,realization of security policies of enterprise using Policy Certificate.Working together w ith existing Public Key Infrastructure,RBAC/Web system gives a full solution t o the problem of access control for the corporate web service by using this meth...

This paper describes a method of implementing R BA C(Role Based Access Control)based on X..509attribute certificate within c orporate intranet.This method achieves user authentication using PKC(Public Ke y Certificate),authorization using X.509Attribute Certificate,realization of security policies of enterprise using Policy Certificate.Working together w ith existing Public Key Infrastructure,RBAC/Web system gives a full solution t o the problem of access control for the corporate web service by using this meth od.

介绍了一种利用X.509属性证书在Intranet上为Web服务实现基于角色访问控制(RBAC-RoleBasedAccessControl)的方案。该方案利用公钥证书实现用户身份认证,利用X.509属性证书实现对用户的授权访问,利用策略证书保证企业安全策略的实施。利用此方案完成的RBAC/Web系统与现有的公钥基础设施相结合,给企业的Web服务提供了完整的访问控制解决方案。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关企业安全策略的内容
在知识搜索中查有关企业安全策略的内容
在数字搜索中查有关企业安全策略的内容
在概念知识元中查有关企业安全策略的内容
在学术趋势中查有关企业安全策略的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社