security policy中文,security policy的意思,security policy翻译及用法

2026-03-22 08:20 浏览次数 18

security policy

英[siˈkjuəriti ˈpɔləsi]美[sɪˈkjʊrɪti/sə'kjurətɪ ˈpɑlɪsi]

[计] 安全策略,安全政策

security policy 片语

片语

security control policy安全控制策略

Security Enforcement Policy安全和实施策略

security technic policy安全技术策略

security management policy安全管理策略

security defense policy安全防护策略

security function policy安全功能策略

security qos policy rule安全服务质量policy规则

European Security Defense Policy欧洲安全防务政策

Security Baseline Policy安全基线政策

security policy 例句

英汉例句

  • The security policy applicable to a system is in essence a well-defined 「repository」 of assertions regarding access permissions granted to the different entities in that system.

    适用于一个系统的安全策略实质上是一个良好定义的「仓库」,它存储了授予这个系统中不同实体的访问权限的断言。

  • Note that this is an example; you or your security policy might dictate additional parameters than are being used here.

    请注意,这只是一个示例,您或您的安全策略可能规定了其他参数,而不是这里使用的参数。

  • SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.

    SECLABEL_BY_NAME:该函数通过指定一个安全策略和这个安全策略中一个安全标签的名称,构建一个安全标签(内部编码表示)。

  • This is the mechanism the container USES to pass security policy information to the provider.

    这是容器用于将安全策略信息传递给提供程序的机制。

  • Then one can gradually lift the security of that user as your security policy demands.

    以后可以根据安全策略的要求逐渐放松此用户的安全限制。

  • The second type of security policy rules, called disclosure rules, specifies what information can be disclosed in a query result and the conditions under which result objects are disclosed.

    第二种安全策略规则类型是公开规则,它们指定在一个查询结果中可以公开哪些信息,以及公开结果对象的条件。

  • Within its boundaries, specify which cloud service type the provider hosts and the consumers rents and subscribe, what threshold policies are applied, and how the security policy is applied.

    在安全策略边界内,指定由提供商托管并由使用者租用和预订的云服务类型、应用的阈值策略以及应用安全策略的方式。

  • Essentially, this works by embedding security policy into the physical connectivity layers of the network.

    本质上,这种隔离的实现机制是将安全策略嵌入到网络的物理连通性层中。

  • This security policy grants access to every user for every project.

    这个安全策略授权每一个人都可以访问项目。

  • The ultimate arbiters of foreign and security policy in Pakistan have long been the army and intelligence services.

    长久以来,巴基斯坦的军队和情报机关一直是外交和安全政策的决定者。

  • Once again, this is the practice of embedding security policy into the physical network design.

    同样,这是将安全策略嵌入物理网络设计中的一种实践。

  • This rule is verbose to make it easier to explain, but also because it expresses the security policy in such a way that, once you「re familiar with the syntax, it」s easy to understand and change.

    此规则非常详细,一方面是为了便于解释,另一方面是因为以这样的方式表示安全策略,一旦您熟悉了语法,要理解和更改它将是非常容易的。

  • A security label belongs to a security policy and contains a value for each security component in that security policy.

    一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。

  • Regular system auditing will also help refine the security policy used for new machine installations as it helps close the feedback loop on what subsystems are actually in use.

    正常的系统审计也可以帮助提炼安装新机器时所使用的安全策略,因为它有助于关闭关于实际使用的子系统的反馈循环。

  • Your organization has a security policy that requires this feature.

    您的组织有一个安全策略要求有这种特性。

相关热词