让互联网更加安全可信!
他说,首先,互联网必须是安全可信的。他没有具体说明。
First, he said, without elaborating, 'The Internet must be safe and credible.
目前下一代互联网技术中解决互联网的安全可信问题的研究还不充分。
Currently, the research on the security and credibility issues of the Next Generation Internet (NGI) is still insufficient.
最后,提出一些关于可信理论以及操作系统安全可信链的实现的改进目标。
At last, we bring up some improvements about trusted theory and implementation of trusted chain of operating system.
随着企业内部网络的日益庞大及与外部网络联系的逐渐增多,一个安全可信的企业网络安全系统显得十分重要。
Is day by day huge along with the enterprise interior network and with exterior network contacting gradual increase, a security credible enterprise network safety system appears very important.
蓝色成为首选之色,因为它是一种保守的、令人愉悦的且符合公司文化的颜色,象征着可信和安全。
Blue became the color of choice because it's a conservative, agreeable, corporate shade that symbolizes being trustworthy and safe.
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.
这两个函数看起来虽然不同,但它们之间是相互关联的,都要求安全令牌必须是可信的,并且信任也必须要以某种形式的令牌表示。
These two functions may seem different, but they interrelate in that security tokens must be trusted, and trust must be represented by some form of token.
浏览器显示一个警告,表明安全证书没有经过可信权威认证,与实际网站不匹配。
The browser shows a warning that the security certificate was not certified by a trusted authority and not matching the actual website.
如果像几个盟国所提议的"核任务共同责任已经结束",那么核安全保障将本质上不得不可信。
NATO's nuclear guarantee will be substantially less credible if, as several allies have proposed, shared responsibility for nuclear missions is ended.
可信的授权机构颁发一份已签名的安全令牌,当中包含一套声明(或者说是凭据)用于应用程序进行验证。
A trusted authority (Issuer) issues a signed security token containing a set claims (credentials) which is given to the application for validation.
将Controller网站添加到可信区域,检查安全区域设置。
Add Controller website to trusted zone, and check zone security Settings.
DB 2:安全管理员应该在远程DB 2数据源上配置联合可信上下文,以定义数据源和WebSphereFederationServer之间的信任关系。
DB2: the security administrator should configure the trusted context object on the remote DB2 data source to define the trust relationship between the data source and WebSphere Federation Server.
下图显示在实现可信登录提供者的情况下IBMCognos8的安全架构。
The following diagram shows the IBM Cognos 8 security architecture when a trusted signon provider is implemented.
通过配置定制的可信登录提供者在安全基础设施中集成IBMCognos8组件。
Configuring the Custom Trusted Signon provider to integrate IBM Cognos 8 components within the security infrastructure.
可信计算基础(Trusted Computing Base,TCB)是 4.1版以后的IBMAIX版本提供的安全功能。
Trusted Computing Base (TCB) is the security feature available with IBM AIX versions later than version 4.1.
可信执行环境是IBMAIXV6.1的高级安全功能,相对于tcb提供了以下优点。
The Trusted Execution environment is the advanced security feature of IBM AIX V6.1, which provides the following advantages over TCB.
HybridCloud应用程序的另一个安全事项是锁住对AmazonSQS服务的访问,从而仅允许可信客户端访问该服务。
Another security consideration for the HybridCloud application is to lock down access to the Amazon SQS service so that only trusted clients can access the service.
可信的证书权威机构发布数字证书,它们被用来鉴别用户和组织访问Web站点,e - mail服务器和其他安全系统的权限。
Trusted certificate authorities issue digital certificates, which are then used to authenticate users and organizations for access to Web sites, E-mail servers, and other secure systems.
安全管理员必须在WebSphereFederationServer 上设置可信上下文对象,以允许建立可信连接。
The security administrator must set up the trusted context object on WebSphere Federation Server to allow a trusted connection to be established.
安全的程序中第一道防线是检查每一个不可信的输入。
The first line of defense in a secure program is to check every untrusted input.
使用发自可信的证书授权中心的数字证书(数字id),连同ssl加密,可为交易中的各方提供很高等级的安全保障。
Using a Digital certificate (Digital id) from a trusted certificate authority in conjunction with SSL encryption provides a very high grade of security for all parties involved in a transaction.
可以将这看作是在网络层上创建安全的可信隧道。
Think of this as creating a secure trusted tunnel at the network layer.
认证权威在数字安全性领域充当一个可信的第三方。
Certificate authorities act as a trusted third party in the world of digital security.
DB 2可信上下文功能是专门为解决这类安全问题而设计的。
The DB2 trusted contexts capability has been designed specifically to address these security concerns.
处理:确保您在使用由可信任的根证书颁发机构颁发的有效的、非过期的安全证书。
Workaround: Ensure that you are using valid, non-expired security certificates issued by a trusted root certification authority.
斯耐展示了一项包括以色列,巴勒斯坦以及约旦的和平协议如何能够并将会给以色列狭窄及脆弱的“腰围”提供可信赖的安全保障。
Mr Sneh shows how a peace deal, involving Israel, the Palestinians and Jordan, could and would provide credible security for Israel along its narrow and vulnerable "waistline".
字典标准化消息中所用的词,RNIF包含确保存在于消息交换中的可信度和安全性的规范。
The dictionaries standardize the words used in the messages, and the RNIF contains specifications to enable trust and security in the message exchange.
不可信,是因为有太多的细节被忽略,而且该计划的核心无法满足保卫欧洲金融安全工作的需要。
Unconvincing, because too many details are missing and the scheme at its core is not up to the job of safeguarding the euro.
联合可信上下文功能为用户提供了改进的安全性、增强的性能和易管理性。
The federated trusted contexts feature provides users improved security, enhanced performance, and ease of administration.
应用推荐