Some would have America retreat from our responsibility as an anchor of global security, and embrace an isolation that ignores the very real threats that we face. 有些人想让美国后撤,摆脱我们做为全球安全基石所承担的责任,奉行孤立,对我们面临的那些真实的威胁视而不见。
PowerVM scales better, has dynamic logical partitioning, security/ fault isolation, support for dedicated I/ O dynamic processor sharing, and live partition mobility. PowerVM扩展性更好,具有动态的逻辑分区、安全性/故障隔离,支持专用I/O动态处理器共享,以及活动分区移动性。
The security isolation mechanism to prevent the potential invalid access, conflict and interference among tenants 安全隔离机制:防止租户之间的非法访问、冲突和干扰
In a multi-tenant context, the security isolation mechanism is very important in preventing the data of one tenant from being accessed illegally by other tenants. 在多租户上下文中,安全隔离机制非常重要,必须防止租户非法访问其他租户的数据。
In order to provide security and isolation of customers, many vendors running clearing houses provide separate paths for each customer. 为了提供安全性和客户隔离,许多运行票据交换所的供应商都为每个客户提供单独的路径。
Since a virtual machine is implemented as a Linux process, it leverages the standard Linux security model to provide isolation and resource controls. 因为虚拟机实现为一个Linux进程,所以它利用标准的Linux安全模型来提供隔离和资源控制。
Isolation – Related to security is isolation. 隔离&与安全相关的是隔离。
Right now AWS trusts the server virtualization tier to provide security and isolation. 当前AWS信任由服务器虚拟化层来提供安全和隔离。
The SDS infrastructure manages request routing, security and isolation. SDS底层管理着请求路由、安全和隔离。
The placement scheme of assemblies in application domains is designed primarily to achieve scalability, security, and isolation goals and can potentially change in future releases. 应用程序域中程序集的位置架构主要为了实现可缩放性、安全性和隔离目标,在以后的版本中可能会更改。
Research on Multi Level Security Model in Networks Isolation Environment 多级安全模型在物理隔离环境中的应用研究
Application of security isolation technology in security protection for electric power information network 安全隔离技术在电力信息网络安全防护中的应用
This article introduced a method how to design for secondary network security in Gezhouba Hydroelectric Area by transverse physical isolation equipment. 提出了采用电力系统专用横向隔离装置进行葛电区域电力二次系统安全防护的设计方案。
We must make sure the confidential data are not only stored separately in a certain region, but also used by authorized users of outside. This technique is named security isolation and information exchange technology, also called GAP. 我们既要保证涉密信息是被隔离地保存在特定的区域内,又要使其能被获授权的外界用户所使用,这种技术被称为安全隔离与信息交换技术,又叫做GAP。
Security system of application environment isolation based on application protocols 基于应用协议的应用环境隔离安全系统
A proxy method for some popular IM software is proposed in a security isolation system, in order to make it possible that clients in the protected LANs can communicate with other clients outside the protected LANs. 在对涉密内网进行物理隔离的安全隔离系统中,提出了一种能够让受隔离系统保护的内网用户使用当前主要的IM业务软件与外网进行通信的代理方法。
In order to improve the structure security in the during earthquake, introducing in based isolation techniques design isolated structure is very necessary and effective. 为了提高大底盘多塔楼结构在地震中安全性能,引入基础隔震技术,进行这种结构基础隔震设计的理论分析和研究是非常必要和有效的。
In this paper, inside-outside network security isolated problem is analyzed from logic isolation, physics isolation and protocol isolation. 本文就电子政务内外网的安全隔离问题从逻辑隔离,物理隔离和协议隔离三方面加以分析,指出了它们缺点与不足。
In this paper, basing on the analyzing the principle and the implement technology of the Security Isolation and Information Exchange Equipment, the performance benchmarking of the equipment is proposed. In addition, the testing methodology of the performance benchmarking has been discussed. 论文在分析了安全隔离与信息交换设备的原理、技术实现的基础上,提出了安全隔离与信息交换设备的性能测试指标,并对测试方法进行了研究和探讨。
Research of Evaluation Method of the Security Isolation and Information Exchange Equipment Based on CC 基于通用评估准则的安全隔离与信息交换设备的测评方法研究
The major questions must be solved to carry out the operational IP Man are follows: network security, end user isolation, end user service QOS, user authentication and accounting management. 实现可运营的宽带IP城域网必须解决的主要问题有:网络的安全性问题、用户数据的隔离问题、用户业务服务质量保证QOS的问题、用户的认证、计费管理问题。
This paper is concerned about the principle and realization technology of the Security Isolation and Information Exchange Equipment, and discusses some popular Security Isolation and Information Exchange Equipments in the internal market. 本文分析了安全隔离与信息交换设备的技术原理及其实现方法,对安全隔离技术的实现机理做了深入研究和探讨,对目前国内主流的安全隔离与信息交换产品做了初步比较。
Design and Implementation of Security Isolation for Electric Power System Networks 电力系统网络安全隔离的设计和实现
Second, a security assurance technical framework has been established based on isolation and access control 、 security assurance of network transportation and intrusion detection system. 通过隔离与访问控制、保障网络传输安全和网络入侵检测三个方面构建网络安全保障框架;
Compulsory medical treatment refers to the ability of non-criminal mentally ill applied, aimed at eliminating the dangers of state, to protect social security mandatory isolation and treatment measures for criminal entities. 强制医疗是指对无刑事责任能力的精神病人所适用的,旨在消除其危险状态、保障社会安全的强制隔离和治疗的刑事实体措施。
Resource delegation platform resolves data security via two aspects, that is, data security based SaaS and data security under resources delegation. Platform ensures data security through user-data isolation and method of privilege-control-access. 3. 论文从SaaS模式下的数据安全和托管环境中的数据安全两个方面解决资源托管平台中的数据安全问题,通过用户数据隔离方法和权限控制访问保证数据的安全。
I mainly analyze the security mechanism of risk isolation function. 本文第三章是重点章节,主要介绍商事信托风险隔离功能的保障性机制。
Network security isolation device using software and hardware combined with the security measures used on the hardware structure of two-machine communication devices through the refuge to achieve physical isolation; in software, using access control, document security technology. 网络安全隔离设备采用软、硬结合的安全措施,在硬件上使用双机结构通过安全岛装置进行通信来实现物理上的隔离;在软件上,采用访问控制、文件安全防护技术。
The deployment of the security technology and equipment in the network system, the secure isolation and data exchange with firewall and secure gateway multiple joint protection strategy. 部署的安全技术设备中,各网络系统间的安全隔离和数据交换则采用防火墙与多重安全网关联合防护的策略。
Traditional network security isolation and information exchange technology mostly includes packet filter technology and proxy technology. 传统的网络安全隔离与信息交换技术主要包括包过滤技术和代理技术。