安全体系结构
例句与用法
- We also give a security architecture model of e - business , which is the necessary guarantee for the e - business
安全性始终是电子商务得以广泛推广的重要保证,论文在对基于组件技术的电子商务讨论的基础上还针对电子商务中的安全问题提出了电子商务的安全体系结构。 - Jia p , wang x r . study on layered management architecture for virtual private network . international conference of control and decision making . haerbin , june 1 - 3 , 2005
王欣荣,贾培.金融网络的安全体系结构研究. 2004中国管理科学与工程发展报告, 295 - 298上海:上海三联书店 - Suffice it to say that with the introduction of the j2ee web application security architecture , we re reaping the rewards of nearly 10 years of trial and error , and it shows
可以说随着j2ee web应用程序安全体系结构的引入,我们不断从近10年的反复试验有所收获,事实也表明了这一点。 - You ve learned the underpinnings of both the code - based authorization model of the original java 2 platform security architecture and the user - based authorization framework introduced with jaas
介绍了原来java 2平台安全体系结构的基于代码的授权模型和在jaas中引入的基于用户的授权框架。 - 3 . cryptogram is the ker11el of information security . on the ground chengdu 2002 . 6 of the general request on information security of information management system of the network - based design
根据网络化设计信息管理系统的总体安全需求,提出了基于密码技术的设计信息管理系统安全体系结构。 - Research and practice shows that the development of a perfect and applicable security architecture is a precondition to provide effective and appropriate safeguards for distributed information systems
为分布式信息系统建立一个完善、合理的安全体系结构,是全面、有效地解决其安全问题的前提。 - After that , it analyzes and studies the security architecture of the 3g mobile communication system . it covers the security menaces faced by 3g , the security principles , objectives and requirements
然后对3g安全体系结构做了详细的分析和研究,概述了3g面临的安全威胁,安全原则,目标和要求。 - From the early days of the so - called java sandbox to the robust , full - featured security architecture introduced with jdk 1 . 4 , security has always been an essential component of the java platform
从早期所谓的java沙箱到jdk 1 . 4引入的健壮的、全功能的安全体系结构,安全性一直是java平台的基本组件。 - To ensure the information security in the time of internet , the primary problem to be solved is to implement the infrastructure of information security by the most effective technologies of security
为了确保网络时代的信息安全,应用最有效的安全技术来建立信息安全体系结构成为首先需要解决的问题。 - Because the dbs cannot meet the requirement of pki , we use the directory service technology to implement the administration of certificate and certificate revocation list for pki system
由于分布式数据库系统不能满足pki安全体系结构的要求,我们采用目录服务技术来为其实现证书、证书作废列表的存储管理。