首页 / 词典 / good

BLP

  • abbr.后送地点(Back Loading Point);基本发射计划(Basic Launch Plan);基本后勤计划(Basic Logistics Plan)
BLPBLP
  1. A Type of Secure Web Server System Based on BLP Model

    一种基于BLP模型的安全Web服务器系统

  2. Analysis and Research of the Security of BLP Model

    BLP模型的安全性分析与研究

  3. Research and Implementation of Mandatory Access Control Based on the Extended BLP Model

    基于扩展BLP模型的强制存取控制的研究与实现

  4. Application research of BLP in networks isolation system

    BLP在网络隔离系统中的应用研究

  5. Implementation and Application of BLP Model Under Linux Environment

    Linux环境中BLP模型的实现及应用

  6. Research on Uniform Purchasing Based on the BLP Model

    基于二层规划模型的统一采购方法研究

  7. BLP Security Model Application and Implementation in Linux Enhancement

    BLP安全模型在Linux系统增强中的应用与实现

  8. A BLP Model Based on Access History

    一种基于访问历史的BLP模型

  9. Improvement of BLP Model and Implementation in LSM of Linux

    BLP模型的改进及在Linux系统中的实现

  10. BLP LLP has become one of the main leaders of the market of asset finance .

    博闻国际律师事务所在资产融资方面已成为市场的主要领导者。

  11. In this section , we focused on BLP impaction on the immune system .

    在本部分中,我们着重研究BLP对免疫系统的影响。

  12. Synthesis of BLP with Phase Transfer Catalysis

    相转移催化合成BLP

  13. So , the different application occasion for different safe model and an implementation method based on BLP safe model is given in this paper .

    在车站售票管理系统中,给出了一种基于BLP安全模型的实现方法。

  14. BLP formalization study and implementation on buffer overflow

    堆栈溢出的BLP形式化研究及实现

  15. Dynamic Determination Schema and it 's Correctness for the Subject 's Sensitivity Label of the Classical BLP Model

    BLP模型主体敏感标记动态调整方案及其正确性证明

  16. Most of current multilevel secure systems adopted Bell LaPadula ( BLP ) Model .

    现有的多级安全系统一般采用BellLapadula(BLP)模型,但是BLP模型的“向下读,向上写”的访问规则严重影响了系统的可用性、灵活性,破坏了数据完整性。

  17. BLP model and its evolution

    BLP安全模型及其发展

  18. Results showed that after BLP in vivo treatment , lymphocytes against tumor antigen-specific proliferation significantly regulated .

    FACS检测淋巴细胞增殖,结果显示BLP体内治疗后,肿瘤致敏的淋巴细胞针对肿瘤抗原的特异性增殖显著提高。

  19. To examine the synergistic effects of LPS , BLP and bacterial DNA in mice ;

    其次,观察了LPS、BLP和细菌DNA体内协同致病作用;

  20. Research on the time-dimain security of BLP model

    BLP模型的时域安全研究

  21. A Fuzzy BLP Model

    一种模糊BLP模型

  22. An adaptable labeling enforcement approach and its correctness for the classical BLP security axioms

    经典BLP安全公理的一种适应性标记实施方法及其正确性

  23. The synergistic effects of LPS , BLP and bacterial DNA were investigated in vivo for the first time .

    通过在体实验,首次进一步观察了细菌LPS、细菌脂蛋白和细菌DNA对小鼠的协同致病作用。

  24. The security policy of security database management system provides the powerful security function to database . The model of BLP is one of common security policy model .

    安全数据库管理系统的安全策略可以为数据库提供强大的安全功能,现在BLP模型是用得比较普遍的策略模型之一。

  25. Research on Authentication Trustworthiness-based BLP Model

    基于认证可信度的BLP模型研究

  26. In the article , Classical BLP Model was introduced to confine the flow of information in order to implement one scheme of AC.

    文章从规范系统内的信息流向出发,引用经典的BLP安全模型,制订了1个小型系统的访问控制设计方案。

  27. The results showed that Teff source from tumor-bearing mice obtained same effect with normal mice cells treated by the BLP .

    结果显示,荷瘤小鼠来源的Teff经BLP体外处理后,获得了与正常脾脏淋巴细胞经BLP处理后相同的效果。

  28. Objective To analyze the clinical and inheritance features of familial bullous lichen planus ( BLP ) .

    目的分析家族性大疱性扁平苔藓(BLP)的临床和遗传特点。

  29. The mechanism of buffer overflow from the point of view of security operating system is analyzed , buffer overflow with BLP model is formalized .

    首先分析了操作系统中客体的类型,将客体分为静态客体和动态客体,然后总结了安全操作系统中对客体的处理存在的问题。

  30. Using the operating action as object of control , the scheme pay much attention to the confidentiality of BLP Model , and also give consideration to the integrity .

    方案以访问动作为控制对象,着重体现了BLP模型所要求的机密性,同时也对完整性有所考虑。