No common security infrastructure is in place.
没有通用安全基础设施。
Business applications and security infrastructure.
业务应用程序和安全基础设施。
Unfortunately, many teams develop their own security infrastructure.
遗憾的是,许多团队自己开发安全性基础设施。
Many times architects decide on building the security infrastructure from scratch.
很多时候,架构师决定从头构建安全基础结构。
In that article, I covered ease of management of a security infrastructure using XKMS.
在那篇文章中,我讨论了使用XKMS实现安全基础设施的易管理性。
The next topic focuses on another important component of the XML security infrastructure — PKI.
下一个话题是XML安全基础设施的另一个重要部分——pki。
The systems will be incorporated into the security infrastructure of a major domestic military base.
该系统将被纳入一个美国国内主要军事基地的安全基础设施当中。
Doing so gives your applications access to a strong and robust standards-based security infrastructure.
这样做可以让应用程序能够访问强大、健壮且基于标准的安全性基础设施。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
When designing your SOA security infrastructure, consider planning to allow certain trusted intermediaries.
在设计SOA安全基础设施时,请考虑允许某些受信任的中介。
Configuring the Custom Trusted Signon provider to integrate IBM Cognos 8 components within the security infrastructure.
通过配置定制的可信登录提供者在安全基础设施中集成IBMCognos8组件。
SAGE USES geospatial data from the National geospatial Intelligence Agency's Homeland Security Infrastructure Program.
SAGE系统采用来自国家地理空间情报局的国土安全基础设施计划的地理空间数据。
Most commonly used, and also the recommended LDAP server for AIX security infrastructure, is the IBM Tivoli Directory Server.
最常用的,也是推荐为AIX安全基础设施使用的LDAP服务器是IBMTivoliDirectoryServer。
The code might have implemented its own threading, caching, connection pooling, or even (heaven forbid) security infrastructure.
该代码可能实现了自己的线程、缓存、连接池甚至(但愿不会如此)安全基础设施。
The project work mainly involved integrating the new security infrastructure over the same distributed file service architecture as in DFS.
这个项目主要的工作是,像在DFS中一样在分布式文件服务架构上集成新的安全基础设施。
Because all LotusLive Engage components are built on the same security infrastructure, there is no need to install any add-on on the client.
因为所有LotusLive Engage组件都是在相同的安全基础设施上创建的,因此无需在客户机上安装任何插件。
As a network security infrastructure, more and more people have paid attention to PKI. But there are still a lot of deficiencies with PKI.
PK I作为一种网络安全基础设施,日益受到关注,但是PKI还有许多问题有待解决。
WebSphere Application Server provides a security infrastructure and mechanisms to protect sensitive JEE resources and administrative resources.
WebSphereApplicationServer提供安全基础设施和机制以保护敏感的JEE资源和管理资源。
XKMS lowers the complexity of deploying PKI in client, and provides an interoperable security infrastructure for the network applications.
XKMS降低了客户端部署PKI的复杂度,为网络应用提供了可以互操作的安全基础设施。
XKMS reduces the complexity of deploying PKI in client, and provides an interoperable security infrastructure for the network applications.
XKMS降低了客户端部署PKI的复杂度,为网络应用提供了可以互操作的安全基础设施。
When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.
当配置服务在服务器外运行时,并没有对其实施访问控制,因为管理安全基础结构是在服务器内运行。
Specific to Version 6.1, there is a new security infrastructure in that is "secure by default," and includes certificate generation (with host names).
对于Version 6.1来说有点特殊,它具有一种“缺省安全”的新的安全基础结构,并且包括了证书的生成(使用主机名)。
In the GT2, the earlier version of GT, it relies on grid security infrastructure (GSI) to guarantee the security of the grid computing circumstances.
早期版本gt2,是通过网格安全基础设施(GSI)来保障网格计算环境的安全。
I have covered enough of canonicalization to help you understand its importance and how it fits into the basic framework of the XML security infrastructure.
我已经充分地讨论了规范化,以帮助您了解它的重要性以及如何适应XML安全基础设施的基本框架。
The service grid lets participating companies act as a loose federation, each with its own internal computer, network, and security infrastructure and policies.
这些服务网格使参与公司可以形成松散的联盟,每个公司具有自己的内部计算机、网络以及安全基础结构和策略。
This way you will be able to leverage the vendor-provided strong security infrastructure and, where business needs require, support more complex authorization rules.
通过这种方式,您将能够利用厂商提供的强安全性基础设施,其中,业务要求需要支持复杂的授权规则。
The XML Key management Specification (XKMS) allows for easy management of the security infrastructure, while the security Assertion Markup Language (SAML) makes trust portable.
xml密钥管理规范(XML Key Management Specification,XKMS)使得安全性基础设施易于管理,而安全性断言标记语言(Security Assertion Markup Language,SAML)则使信任可以移植。
The XML Key management Specification (XKMS) allows for easy management of the security infrastructure, while the security Assertion Markup Language (SAML) makes trust portable.
xml密钥管理规范(XML Key Management Specification,XKMS)使得安全性基础设施易于管理,而安全性断言标记语言(Security Assertion Markup Language,SAML)则使信任可以移植。
应用推荐