security constraint

英 [sɪˈkjʊərəti kənˈstreɪnt] 美 [sɪˈkjʊrəti kənˈstreɪnt]

网络  安全约束; 安全性约束; 安全限制

计算机



双语例句

  1. You will need to define a security constraint for the Web application.
    需要定义Web应用程序的安全约束。
  2. Note: If you need to access resources that require authentication, you can specify a second servlet mapping that is associated with a security constraint.
    注意:如果您想访问需要认证的资源,那么您可以指定第二个与安全性限制相关联的servlet映射。
  3. Add a security constraint called "GET_Constraint", set the resource name to" All", choose the HTTP GET method and set the pattern to/
    添加名为“GETConstraint”的安全约束,将resourcename设置为“All”,选择HTTPGETmethod并将pattern设置为/
  4. However, a sustainable carbon budget scheme is undoubtedly achievable if the global carbon budget ( the total amount of permitted by climate security) is made an absolute constraint.
    以气候安全的允许排放量为全球碳预算总量,设为刚性约束,可以确保碳预算方案的可持续性;
  5. Based on particle swarm optimization ( PSO) algorithm and considering N-1 security constraint, a method for available transfer capability ( ATC) of power system is presented in this paper.
    针对N-1静态安全模型的电力系统可用输电容量(ATC)计算问题,提出一种基于粒子群进化算法的新方法。
  6. Security constraints are consistent by modifying security constraint definition, and an effective classification assignment algorithm is given in this paper.
    通过修改安全约束的定义,使得安全约束之间始终是协调的,并给出一种高效的密级分配算法;
  7. Research and Application of Telecommand Security Constraint for Integrated Telecontrol Center
    集控中心遥控安全约束的研究和应用
  8. The capability constraint of branches and transformer substation, the security constraint of node voltage are dealt with by the penalty function of individual fitness, by which the problem of individual constraints is solved effectively.
    而支路、变电站的容量约束和节点电压安全约束则通过个体适合度的罚函数来处理,从而有效解决了个体的约束处理问题。
  9. The concept of level enhances the security of the model, and the introduction of some concepts makes security management jobs more convenient and more flexible such as context constraint, task assigning policy, task hierarchies and private task.
    该模型引入了任务分配策略、任务指派方式、任务层次、私有任务、双重验证、按级别授权等概念。这些概念使管理员的安全控管工作更加灵活、简便。
  10. Finally, auditing monitoring and security supervision should be strengthened to establish an external constraint system against earnings management.
    最后,加强和改善审计监督和证券监管,形成对上市公司盈余管理的外部约束机制。
  11. On the basis of the present condition of the integrated telecontrol center, in the paper, we researched the project of the telecommand security constraints system and analyzed these aspects such as the control logic, constraint mechanism and workflow control etc.
    根据集控系统的现状,从逻辑构成、约束机制、流程控制等方面进行详细的分析,研究应用于控制中心的遥控安全约束系统。
  12. NSWS is a key stage in the whole network security defence architecture, but the traditional NSWS is lack of effective means of detecting the unknown attacks, passive to detect security issues and difficult to be deployed because of the constraint of Firewall/ NAT.
    但传统的网络安全预警系统存在对未知的攻击缺乏有效的检测方法、对安全问题的检测通常处于被动阶段、在广域网部署受防火墙/NAT的限制等问题。
  13. Implementation of multilevel secure relational database using security constraint processing
    用安全约束处理实现多级安全数据库管理
  14. The method is efficient for planning in fixed conditions selected by distance and security required which avoid the random or unpredictable result and ensure that a constraint optimum path will be generated for mobile robot to excute.
    约束参量的使用能够有效地避免传统方法在搜索过程中的随机性,协调路径规划中的最短距离和最大安全需要,搜索给定参数下的最优路径空间。
  15. And then construct a security mechanism of knowledge sharing including knowledge sharing technologies, organizational structure system, culture sharing, incentive system and constraint system, so as to ensure knowledge sharing of EPC projects could be really effectively carried on.
    接着构建了一个包含知识共享技术、组织结构体系、共享文化、激励制度和约束制度的知识共享保障机制,保证EPC项目知识共享的有效实施。
  16. This algorithm can also be adopted to solve the security constrained unit commitment. It is solved by changing the constraint of branch into generator, simulation demonstrates the applicability of the proposed method.
    同时对于考虑网络安全约束的机组组合问题,将支路约束转换为发电机功率约束进行求解,通过算例验证了算法的适用性。
  17. However in meanwhile of convenience, P2P technology allows e-commerce security issues of trust more severe, which has become a P2P e-commerce development constraint.
    但带来方便的同时,P2P技术使电子商务的信任安全问题更加严峻,已经成为P2P电子商务发展的制约因素。
  18. The dissertation discusses security policies and security constraint consistency. We sett security conflict by detecting constraint conflict and adjusting the policies. 4.
    因此本文讨论了各种安全策略和安全约束之间的一致性问题,通过约束冲突检测和策略调整与融合,消除冲突,实现一致性授权。
  19. The paper studied the security core idea, the security culture safeguard system, security culture constraint condition and its movement way.
    论文对安全核心理念、安全文化保障系统、安全文化约束条件及其运行方式等问题进行了研究。
  20. When we share the information and access the resource, we must consider the security of the system that we access. Access control is a security service mechanism, which constraint the action to the resource to insulate the sensitivity information.
    在进行信息共享和资源访问的同时,必须兼顾到系统的安全性,而访问控制正是一种通过约束用户访问行为而达到对敏感信息进行隔离目的的安全服务机制。
  21. The model considers the basic security requirements and operation requirements. The models restrict the delegation by kinds of the security constraint rules. So the model not only can sustain the agility, but also can assure the security of authorization.
    该模型综合考虑了各种基本的安全需求和业务需求,通过多种安全约束规则,实施对委托授权的限制,从而确保在支持授权灵活性的同时,确保授权安全性。
  22. This model fully considered the constraint of Chinese wall security strategy to the delegation authority. Except adding several common constraint conditions to the delegation constraint, the model also added CWSP constraint.
    该模型是充分考虑了中国墙安全策略对委托授权的约束,在委托约束中除了加入几种常见的约束条件外,还把CWSP限制也加入其中。