security requirement造句1 To identify the security requirements of information systems, a business process-based security requirement analysis method was presented.
2 In particular, in business transactions among enterprises, the security requirement of non-repudiation needs to be satisfied.
3 The method is capable of fulfilling the access security requirement and real-time control of IED.
4 The principal security requirement is that untrusted code should not be able to change the logging configuration.
5 To meet gigabit network's security requirement, people give several solutions, including implement based on general CPU, implement based on ASIC and implement based on network processor.
6 Point out the security requirement of CAD systems and problems must be solved.
7 This same security requirement applies to REST access to a data grid.
8 It fulfills a kind of new security requirement based on the Content Extraction Signature(CES) algorithm, i. e. verifies the part of the content within EHR without to disclose the whole document.
9 Towards the security requirement, introduce security technology, present system security strategy and analyses the security implementation.
10 Since the security requirement dictates that the means of payment (such as credit card or bank check) must be hidden from unauthorized viewers, encrypting the Payment element pays off.
11 The security requirement should look at the protected target and the grades of protecting, and dispose and select the proper security mechanism for use.
12 Aiming at thee-mail security requirement in the OA system the article proposes the method of encryption and data signature. This method is based on the widely used email encryption software PGP.
13 Authenticating your site's users is one such critical security requirement.
14 You must bear in mind the need to safeguard public funds and observe security requirements.
15 The techniques described above allowed the team to secure specific pages to meet the customera ?s security requirement in an efficient and maintainable manner.
16 Because of the unsuitable of using only symmetry cryptogram or public key cryptogram, it could hardly fulfill the information security requirement.
17 The work in this paper offers reference to applications with high security requirement.
18 Researching the cause, the accident occurs and expands because of the transportation corporation or the practitioner don′t comply the security requirement of the dangerous cargo transportation.
19 It is indicated that Cao Guoliang et al's multicast key management scheme based on generalized cat map does not satisfy the independent security requirement of individual keys of group members.
20 In today's growing complex data center and cloud computing environments, isolation of resources is a key security requirement.
21 It contains a list of portlets and their associated properties, such as security requirement, personalization and customization requirements per portlet, and types of views desired per portlet.
22 That solution combines the computer technology, such as access control, database security, and firewall etc with security requirement of banking business in the financial information system well.