您要查找的是不是:
- Thirdly, it specifically explains existing information security model of WFMS, including workflow reference model, identity authentification model, access control model and authorization model. 然后详细的解释说明了当前已有的工作流管理系统的信息安全模型,包括工作流管理系统参考模型,身份认证模型,访问控制模型和授权模型。
- Active Information Security Model Based on Agent 一种基于Agent的主动式信息安全模型
- Object Petri Nets'Application in Information Security Model 对象Petri网在信息安全建模中的应用
- In this paper, firstly is about the importance of information security and researchstatus and trench of information security in both abroad and domestic. Then described some classic information security models such as BLP, Biba, RBAC, McCumber etc. 本文首先探讨了信息安全的重要性及目前国内外的现状与发展趋势,然后研究了一些经典的信息安全模型,如:BLP模型、Biba模型、RBAC模型、McCumber模型等,McCumber模型体现了在实现安全目的过程中安全措施选择的重要性。
- BLP-based Information Security Model in Secure Operating System 基于BLP的安全操作系统信息安全模型
- Study of Information Security Model for Extended Services of China Railway Ticketing and Reservation System 客票系统延伸服务信息安全模型的研究
- The security model of IIS is at fault here. IIS的安全模型这里有毛病。
- Want to know more about information security? 希望对资讯保安有更多的认识?
- Independent review of information security. 信息安全的独立的回顾。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- User authentication is the cornerstone of information security. 用户身份认证是信息安全的基石。
- Does your application support a particular security model? 您的应用程序是否支持特殊的安全模型?
- Then we give a systemic description of the BLP Security Model. 第五章详细讨论了BLP安全模型,在理论上对Linux系统安全作了抽象提高与总结;
- information security model 信息安全模型
- The NT security model is MOSTLY able to reproduce the POSIX model. NT安全模组大多数能再生产POSIX模组。
- Where can I obtain more information about Information Security? 我可从哪里取得有关资料保安的资料?
- CAJ-digital watermark in information security applications. 数字水印在信息安全中的应用.
- ICPO... information security section, anti-cybercrime group... 他并未回头,冷澈的嗓音在夜色中飘来,“...
- CAJ digital watermark in information security applications. CAJ数字水印在信息安全中的应用.
- You need more sophisticated programmability or a different security model. 您需要更成熟的可编程性或不同的安全性模型。