freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

面向業(yè)務(wù)的應(yīng)用支撐平臺(tái)安全管理體系設(shè)計(jì)與實(shí)現(xiàn)畢業(yè)論文(文件)

 

【正文】 . 8 main function ........................................................................................ 9 sum up of this chapter................................................................................. 11 chapter 3 design and implementation of IP strategy ................................................. 12 design.......................................................................................................... 12 IP strategy of system ........................................................................... 12 IP strategy of user................................................................................ 14 IP strategy format and judgement rule ....................................................... 15 realization ................................................................................................... 16 IP strategy of system ........................................................................... 16 IP strategy of user................................................................................ 17 sum up of this chapter................................................................................. 19 chapter 4 design and implementation of authentication ......................................... 20 design.......................................................................................................... 20 CA authentication ....................................................................................... 22 design of system’s entry ...................................................................... 22 design of system’s authentication ....................................................... 23 design of digital certificates and user’s mapping ................................ 26 explain of implement .......................................................................... 27 AD authentication....................................................................................... 27 design of AD data synchro .................................................................. 28 design of user’s entry in AD ............................................................... 28 user and password....................................................................................... 31 static model ......................................................................................... 32 dynamic model .................................................................................... 32 realization............................................................................................ 34 Single Sing On............................................................................................ 34 configuration ....................................................................................... 35 unify user’s data .................................................................................. 35 authentication principle....................................................................... 36 authentication process ......................................................................... 36 山 東 大 學(xué) 碩 士 學(xué) 位 論 文 meeting with system ........................................................................... 37 server of central authentication ........................................................... 38 client agent of central authentication .................................................. 38 realization of multiple authentication ......................................................... 39 config of ............................................................................... 39 config of ............................................................ 40 sum up of this chapter................................................................................. 45 chapter 5 design and implementation of rights management.................................... 46 design.......................................................................................................... 46 logical view ................................................................................................ 47 function authorization................................................................................. 48 data authorization ....................................................................................... 49 realization ................................................................................................... 52 sum up of this chapter................................................................................. 54 chapter 6 design and implementation of system audit .............................................. 55 design.......................................................................................................... 55 main data structure and class design .......................................................... 58 realization ................................................................................................... 60 sum up of this chapter................................................................................. 61 chapter 7 tag ............................................................................................................... 62 conclusion ................................................................................................... 62 work of future ............................................................................................. 62 referrence ..................................................................................................................... 64 acknowledgement......................................................................................................... 66 山 東 大 學(xué) 碩 士 學(xué) 位 論 文 I 摘 要 隨著社會(huì)信息化的發(fā)展,很多單位采用應(yīng)用系統(tǒng)作為管理手
點(diǎn)擊復(fù)制文檔內(nèi)容
研究報(bào)告相關(guān)推薦
文庫(kù)吧 www.dybbs8.com
備案圖鄂ICP備17016276號(hào)-1