This same security requirement applies to REST access to a data grid.
这个相同的安全需求适用于对数据网格的REST访问。
Authenticating your site's users is one such critical security requirement.
对站点的用户进行身份验证是一项非常重要的安全需求。
Compared to other solutions, they're an easy way to fulfill a security requirement.
与其他解决方案相比,它们为满足安全需求的一种简单方法。
The security requirement I am concerned with is authentication. Consider the following two issues
我所关注的安全性要求是身份验证。
The principal security requirement is that untrusted code should not be able to change the logging configuration.
为了保证安全,日志操作需要保证不受信的代码无法修改日志控制配置。
In addition to the above two security requirements, non-repudiation is an important requirement in B2B applications as well.
除了以上两项安全性要求以外,不可抵赖性也是B2B应用中相当重要的一个要求。
In particular, in business transactions among enterprises, the security requirement of non-repudiation needs to be satisfied.
特别是在企业间的商业交易中,不可抵赖性的安全性要求需要得到满足。
With the development of the security requirement of modern society, it becomes the mainstream to identify one's identity with biometric today.
随着现代社会对安全的要求不断提高,利用生物特征进行快速准确的身份识别成了当今的主流。
Absrtact: With the development of the security requirement of information society, it becomes the mainstream to identify one's identity with biometric today.
摘 要:随着信息社会对安全的要求不断提高,利用生物特征进行快速准确的身份识别成了当今的主流。
Therefore once the security requirement in single prover condition is satisfied the identity authentication protocol can also be run in multi-provers condition.
因此,只要满足了其中单证明者环境下的安全要求,身份认证协议也能安全地运行在多个证明者的环境下。
Security requirement analysis is a very important part of software vulnerability analysis technology, it points out the analysis direction and improves efficiency.
安全需求分析是软件漏洞分析中极重要的一个环节,能够指明分析的方向,提高分析的效率。
With the development of the information security requirement of modern society, using biometric character to identify one's identification quickly and exactly thrives.
随着现代社会对信息安全要求的不断提高,利用生物特征进行快速而准确的身份识别越来越受到人们的重视。
Since the security requirement dictates that the means of payment (such as credit card or bank check) must be hidden from unauthorized viewers, encrypting the payment element pays off.
由于安全性要求规定必须对未授权的查看者保密支付方式(诸如信用卡或银行支票),对Payment元素加密就做到了这一点。
To meet gigabit network's security requirement, people give several solutions, including implement based on general CPU, implement based on ASIC and implement based on network processor.
面对千兆网络的安全需求,人们提出了不少的解决方案,其中主要有基于通用CPU实现、基于ASIC实现和基于网络处理器实现这三种。
Despite security targets of wireless network, MANET has not only its special security requirement, but also additional vulnerabilities and features pertinent to this networking paradigm.
移动自组网络除了要达到传统有线网络中的安全目标外,还有自身特殊的安全需求,而它的特性又使之容易遭受各种攻击。
In this paper, from information security requirement analysis, constructing information security model is put forward through ring upon ring decomposing and progressively thinning method.
文章通过对信息安全的需求分析,提出了对信息安全需求用层层分解、逐步细化的方法来构造信息安全模型。
It contains a list of portlets and their associated properties, such as security requirement, personalization and customization requirements per portlet, and types of views desired per portlet.
它包含一个Portlet及其相关属性列表,例如安全需求、每个Portlet的个性化和自定义需求,以及每个Portlet需要的视图类型。
A detailed list of common security requirements that requirement specifiers can incorporate directly into their work, and a checklist of security concerns to consider when building new requirements.
一个公共安全需求的详细清单,需求指定者可以直接合并到他们的工作,但是安全性的检查单涉及到何时构建新的需求。
Researching the cause, the accident occurs and expands because of the transportation corporation or the practitioner don′t comply the security requirement of the dangerous cargo transportation.
究其原因,其中绝大部分事故是运输单位或者从业人员没有遵守危险物品运输的安全要求而诱发、扩大事故的。
It fulfills a kind of new security requirement based on the content Extraction Signature (CES) algorithm, i. e. verifies the part of the content within EHR without to disclose the whole document.
该方案采用基于内容提取签名(CES)的算法,实现一种新的安全需求,即在不出示完整病历文档的情况下认证文档中的部分内容。
We treat high-level policy as security requirement and low-level policy as the implementation of the high-level policy, a proper low-level policy configuration must meet the security requirement.
高级安全策略又称为安全需求,低级策略配置是高级策略的实现,正确的低级策略配置必须能够满足安全需求。
The security requirement based on the business process characteristic of order processing is analysed in the thesis, and a security solution that has application values for the system is designed.
根据企业询单处理的业务过程特点,进行基于业务过程的询单处理信息系统安全需求分析,在此基础上,为制造企业询单处理信息系统建立了有应用价值的安全解决方案。
To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.
针对这一应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行的可信平台的模型和体系结构。
To address this requirement, the security service should address the following items.
为了处理这个需求,安全服务应该处理下面的事项。
It could even be a requirement for insurance coverage, allowing a market for information security to emerge.
这些信息甚至可作为保险责任范围的一项必要条件,以利于信息安全市场的形成。
SOA security must be factored into the SOA life cycle, reflecting the fact that security is a business requirement and not just a technology attribute.
必须在SOA生命周期中考虑到soa安全性,并反映安全性是业务需求而不只是技术特性的事实。
Application security is an important emerging requirement in software development.
应用程序安全是在软件开发中正在形成的一个重要的需求。
The House favours another so-called "Buy American" requirement for spending on uniforms for the more than 100, 000 officers in the Department of Homeland Security.
众议院还支持提出另一份所谓“购买美国货”的条款,要求为国土安全部十万多名人员购买本国出产的制服。
The House favours another so-called "Buy American" requirement for spending on uniforms for the more than 100, 000 officers in the Department of Homeland Security.
众议院还支持提出另一份所谓“购买美国货”的条款,要求为国土安全部十万多名人员购买本国出产的制服。
应用推荐