您要查找的是不是:
- The security model of IIS is at fault here. IIS的安全模型这里有毛病。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- Does your application support a particular security model? 您的应用程序是否支持特殊的安全模型?
- Then we give a systemic description of the BLP Security Model. 第五章详细讨论了BLP安全模型,在理论上对Linux系统安全作了抽象提高与总结;
- The NT security model is MOSTLY able to reproduce the POSIX model. NT安全模组大多数能再生产POSIX模组。
- You need more sophisticated programmability or a different security model. 您需要更成熟的可编程性或不同的安全性模型。
- Bell-LaPadula model(BLP) model is the most classical multilevel computer security model. BLP模型是最为经典的计算机多级安全模型。
- A uniformly congruent security model is presented based on observational congruence. 基于观察同余等价;构造了一类一致同余安全模型.
- A secure model of SSL/TLS is provided to solve these problems. 提出了一个安全的SSL/TLS协议通信模型。
- Finally by using MVC structure the secure model was reali... 最后,利用MVC架构实现安全模型。
- In the Policy column, find Network access: sharing and security model for local accounts and double-click on it. 在“策略”列中,找到“网络访问:本地帐户的共享和安全模式”并双击它。
- If your application implements a security model on the local machine, you'd also need administrator privileges. 如果应用程序在本地计算机中实施安全模型,也会需要管理员权限。
- Dialog security must be configured manually according to the full security model. 必须根据完全安全模式手动配置对话安全模式。
- The kernel usually has some sort of security model that manages access to devices, files, processes, and objects. 内核通常具有某种类型的安全模式来管理对设备、文件、进程和对象的访问。
- Is there a need to integrate the service security model with application or legacy security systems? 是否需要使用应用程序或遗留安全系统来集成服务安全模型?
- In this dissertation the integrated and privilege-role extended UNIX operating system security model, which is based on the BLP model, is discussed. 在对BLP模型进行分析的基础上,提出了以BLP模型为基础的完整性和特权角色扩展的UNIX操作系统安全模型。
- Anderson in 1972, is the theoretical foundation of security model for operating system. Anderson在1972年提出的针对操作系统的安全模型的理论基础。
- There are also several security models that a device can be set to run in. 设备在经过设置后,还可以在几种安全模型中运行。
- The integration of RBAC security model and generally UML design model is introduced. 阐述了系统RBAC的安全模型与系统通常UML设计模型的集成。
- By using these methods,we develop the BLP Model into a new Multi-level Security Model with memory ability. 通过这些方法将BLP模型改造成为具有记忆能力的新型多级安全模型。