您要查找的是不是:
- Is there written corporate access control policy governing access to computing resources? 有否制定有关管制使用公司电脑资源的政策?
- In some degree,the P2P platform ensures P2P computing security by authority and access control policy. 该平台结合了Web Services中的XML,SOAP等技术以及JXTA架构,在一定程度上实现了P2P环境中的安全认证与资源的访问控制,保证了P2P计算的安全性。
- A firewall is a system or group of systems that enforces an access control policy between two networks. 防火墙是在两个网络之间执行访问控制策略的一个或一组系统.
- This paper presented a flexible, object-oriented and declarative access control policy, its decision-making algorithm and enforcement framework. 摘要提出了一种声明式的、面向对象的、灵活访问控制策略的形式化描述、决策算法和实施框架。
- In the right details pane, locate the User Access Control policies. 在右窗格中的细节,找到用户接入控制政策。
- A data sharing and cooperative access control policy model aiming at the weakness of collaboration and self-security in DIDS(Distributed Intrusion Detection System) is presented. 针对分布式入侵检测系统(DIDS:Distributed Intrusion Detection System)面临的协作和自身安全问题,提出了一个分布式入侵检测系统和多组件入侵检测系统间的数据共享策略和合作访问控制策略模型。
- At last,an application instance of P2P distributed computing with grid security certification and access control policy were designed and implemented by combining with the research project of grid security. 结合网格安全项目的研究,设计并实现了利用网格安全认证、访问控制策略进行P2P分布式计算的应用实例。
- Maximal Discretionary Access Control (MDAC) is the access control policy of owner-centric file sharing mechanism in grid environment, we define MDAC based on the method of BLP model. 完全自主型访问控制(MDAC)是所有者为中心的共享机制实现网格环境访问控制的策略,本文用BLP模型的方法对MDAC进行了定义。
- While authentication can be provided by an existing PKI (Public Key Infrastructure) system, access control needs implementation of administrative function and access decision function, based on the access control policy and model selected. 身份认证可以采用现有的公开密钥基础设施(Public Key Infrastructure, PKI)来完成。 访问控制就要根据采用的访问控制策略和访问控制模型,实现对系统资源和用户安全属性的统一管理,并在此基础之上提供用户到资源的访问控制决策功能。
- DACS divide VO users intodifferent levels and resources only maintain access control policies to all users in same level as a whole. DACS将VO用户划分为不同的等级,资源只需对VO用户按级别进行整体授权。
- However,models compiling access control policies in the data encryption cannot tackle this dynamicity.With the emergence of hardware and software... 本文提出了一个结合静态模型和动态模型的新的混合方案,举例介绍了基于客户端的动态访问控制部分,并与纯动态方案在性能上作了比较。
- A trusted Group Key Server (GKS) is introduced to manage file encryption keys in a centralized manner and to enable the employment of flexible access control policies. 引入可信的组密钥服务器(GKS)集中管理文件加密密钥,GKS上可以实施灵活的访问控制策略。
- Abstract Automated Trust Negotiation (ATN) provides a means to establish the trust membership by disclosing and matching credentials and access control policies. 摘要自动信任协商(ATN)是指通过暴露信任凭证与访问控制策略进行匹配以达到建立信任关系的目的。
- Access Control Policy for Active Node Resources 主动节点资源访问控制策略
- The security policies include the public key infrastructure(PKI) management model based on bridge certificate authority(CA),the authentication policy based on virtual organization and the access control policy such as delegation in grid environment. 这些关键策略包括:基于桥接CA(认证中心)的PKI(公钥基础设施)管理方式、基于虚拟组织的认证策略、网络环境中委托授权的访问控制策略等。
- discretionary access control policy 自主访问控制政策
- Automated Trust Negotiation, for short ATN, is an approach to establishing trust relationship between strangers through iterative disclosure of digital credentials and access control policies. 自动信任协商是一种通过逐步暴露证书和访问控制策略以确立协商双方信任关系的安全方法。
- An Access Control Policy for Remote Computing System 远程计算系统的访问控制策略研究
- What do you reckon the birth control policy? 你如何看待计划生育政策?
- Improvement of Access Control Policy and Realization Mechanism in PMI PMI中访问控制策略和实现机制的改进