They can also be passed in other ways (such as in the security headers of a request to another service).
它们还可以以其他的方式传递(比如以对另外一个服务的请求的安全头部的形式)。
This infrastructure can also act as a point of control to apply service management, security, monitoring, and instrumentation to the Service-Oriented Architecture.
这个基础设施同样也可以作为控制点,将服务管理、安全、监视和规范应用于面向服务的体系结构。
Enterprise services run on the enterprise services node that contains the products that provide the data, security and other infrastructure services such as a service registry.
企业服务在企业服务节点上运行,此节点中包含提供数据、安全和其他基础设施服务(如服务注册中心)的产品。
In addition, GVPE is also easy to setup and configure as a restartable and permanent service, while still retaining security.
另外,作为一个可重启和永久的服务,GVPE还容易设置和配置,同时仍然保持安全性。
This redundancy was induced because the PAC was embedded in service tickets and flowed as a single security entity from the client to the server.
这种冗余是由于PAC是嵌入在服务令牌中并且作为一个安全实体在客户机与服务器之间进行流转而引起的。
These assertions are created by the entity responsible for security enforcement (such as a security service) to convey its findings to other entities that depend on those findings.
通过实体创建的这些断言负责安全执行(如安全服务),以传递其结果给依靠这些结果的其他实体。
In contrast, a system may require identifying information in order to handle matters such as security or quality of service.
相比而言,为了处理诸如安全或服务质量之类的事情,系统就需要标识信息了。
A typical process of policy based service security management can be divided into five steps and described as follows.
如下面所述,一个基于策略的服务安全管理的典型流程可以分为五大步骤。
The gateway component acts as a central control point for service routing, protocol transformation, and security.
网关组件为服务路由、协议转换以及安全担当着中央控制点的角色。
You can prepare a single service gateway that exposes all (or at least groups of) services and that performs all common processing, such as monitoring, diagnostics, accounting, and security.
您可以准备一个单一的服务网关,它将公开所有(或者至少是几组)服务并执行所有常见处理,比如监视、问题诊断、记录和安全性。
The service grid lets participating companies act as a loose federation, each with its own internal computer, network, and security infrastructure and policies.
这些服务网格使参与公司可以形成松散的联盟,每个公司具有自己的内部计算机、网络以及安全基础结构和策略。
Locals say the building, which is now used as a training facility by Lithuania's state security service, originally had no Windows.
当地人说这栋楼以前没有窗户,现在被立陶宛国家安全部门作为训练中心使用。
Managing and securing service interactions as a policy enforcement point for security and management services as well as the registry.
作为安全和管理服务以及注册中心的策略执行点,对服务交互进行管理和保护。
The sample configuration includes a client, provider, and security token service (STS) configured, as shown in Figure 1.
样例配置中包含一个客户端、提供者和已配置的安全令牌服务 (Security Token Service,STS),如图 1 所示。
As for spam, ISPs (including mail service providers) could limit their users to, say, 100 e-mails a day; for more, you have to pay or at least post a security bond, or pass some good behavior test.
对于垃圾邮件,网络服务商(包括邮件服务商)应该对用户有所限制,比如说每天只能发一百封邮件,更进一步说,你得付费,或至少发布安全债券,或通过一个好的行为测试才行。
If you decide on a dedicated security monitoring Web service as the host, keep in mind that this is not the same thing as a centralized security monitoring Web service.
如果您决定采用作为主机的专用安全监视Web服务,务必记住这与集中的安全监视Web服务不是同一回事。
Potentially, those filters serve as a policy enforcement layer where the message is first checked from the security and Quality of Service (QoS) standpoints, and then is queued for processing.
这些筛选器可能作为策略强制层,消息首先在这里经过安全和服务质量(QoS)检查,然后排队等待处理。
Interoperable Web services can make those security solutions available to product and service providers as a kind of utility.
可互操作的Web服务可以将那些安全性解决方案用作产品和服务供应商的一类实用程序。
Using the WebSphere Process Server Web service API involves a number of steps, such as copying key artifacts, generating the proxy clients, and ensuring security.
使用WebSphereProcessServerWeb服务API涉及许多步骤,比如复制关键工件、生成代理客户机和确保安全性。
As Figure 1 shows, WS-Security is a Web Service security standard on which other Web Services security standards are built.
如图1所示,WS - Security是一个Web服务安全性标准,其他的Web服务安全性标准构建在它的上面。
Terremark currently has 13 data centers scattered throughout the United States, Europe and Latin America, and offers IAAS (Infrastructure as a service), security and managed services.
Terremark目前有13个数据中心,遍及美国、欧洲和拉美,提供了IAAS (Infrastructureas a Service)、安全与管理服务。
Platform-as-a-Service: BPM BlueWorks runs on a middleware platform that includes application servers, database servers, collaboration servers, and security servers.
平台即服务(Platform - as - a - Service):BPMBlueWorks运行在一个包含应用服务器、数据库服务器、协作服务器和安全服务器的中间件平台上。
It has been running the Ubuntu Enterprise Cloud service for too long now and offers security as well as a cost effective solution.
很早之前它已经运行了Ubuntu企业云服务,并提供安全性以及成本效益的解决方案。
0ther patterns — such as a WS-security pattern — that directly impact the service definition would be applied at this layer.
其他直接影响服务定义的模式——如WS - security模式——也可应用于这个层。
This is a security token service (STS), as defined in the OASIS WS-Trust specification.
这是一个OASISWS - Trust规范中定义的安全令牌服务(STS)。
CloudFlare makes a cloud-based software program that purportedly helps protect websites from security violations such as malware and denial of service attacks.
CloudFlare开发了一款云端软件程序,可以帮助网站免受恶意软件和DoS攻击的威胁。
As a result, many MSP have begun to add security protection services to their list of services, thus deriving the concept of secure hosting service provider (MSSP).
因此,很多MSP也开始将安全保护服务添加进了他们的服务清单中,由此便衍生出了安全托管服务提供商(MSSP)这个概念。
It requires various factors to host a successful Olympic Games, such as venue construction and operation, city operation, environment improvement, media service, volunteer service and security.
举办一届成功的奥运会,涉及多方面因素,如场馆建设和运行、城市运行保障、环境整治、新闻宣传、志愿者服务、安全保障等。
Now many cloud-based vendors are doing a better job of security than most ordinary companies can do in-house, as the cloud providers are held to such strict service-level agreements.
而现在许多云服务供应商严格遵守服务等级协议,他们的安全措施已经要比许多普通公司要好得多了。
The mechanism can be offered to normal users as a security service based on levels.
该机制可作为一种基于等级的安全服务提供给用户。
应用推荐