End-to-end security must be enabled to use this feature.
必须启用全程安全性才能够使用此特性。
The need for an end-to-end security solution is on the horizon.
于是就出现了对端到端安全性解决方案的需求。
To provide end-to-end security, we need to secure XML documents.
为了提供端到端安全性,我们需要确保XML文档的安全。
When securing digital information, it is important to implement end-to-end security.
在保护数字信息时,实现全程安全性是很重要的。
XML encryption provides end-to-end security for applications that require secure exchange of structured data.
XML加密为结构数据的安全交换提供了端到端的加密。
In order for the human task administration functions to work properly, you must have end-to-end security enabled.
为了让人工任务管理功能正常工作,必须启用全程安全性。
Finally, Research on safety communication, we propose a safety-invoking mechanism, ensuring end-to-end security.
第四,开展了安全通信的研究。提供了安全调用服务的机制,保证端到端的安全。
Without a WAP gateway in the middle, smart applications can provide scalable end-to-end security from the back end to wireless devices.
由于中间没有WAP网关,智能应用程序可以提供从后端到无线设备的可伸缩的端对端安全性。
To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.
为了解决这些问题,我们需要一种具有灵活加密方案的端对端安全性模型以满足一系列不同的需求。
This incorporates many elements, including consumer, enterprise, femtocells, transcoding, end-to-end security, home gateways, and mobile broadband-enabled services.
这合并了许多元素,包括使用者、企业、家庭基站、转码、端到端安全性、家庭网关和启用移动宽带的服务。
This architecture USES WS-Security to provide end-to-end security and possibly non-repudiation (if the service persists the inbound message before removing security).
此体系结构使用WS - Security来提供端到端安全和可能的不可否认性(如果服务在删除安全前保存入站消息)。
Both solutions provide message-level security, incorporating security features in the SOAP message and working in the application layer, thus ensuring end-to-end security.
这两个解决方案都提供了消息级别的安全性,将安全功能合并到SOAP消息中并作用于应用层,因此保证了端到端的安全。
For example an application may support both requester and provider role in different end to end interactions or external security services may support one or more of the functions listed.
例如,应用程序可能在不同的端到端交互中同时支持请求方和提供者角色,或者外部安全服务可能支持所列出的一个或多个功能。
The end to end security model would mean that all providers give access to all trusted requesting applications.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.
NFSRPC请求可以使用密码认证的能力提供了端到端的NFS安全支持。
Each of the components may have options for the way in which they fulfil their security role and end to end paths must be determined to match up the capabilities across all capabilities.
每个组件可能在执行安全角色方面有多个选择,而必须确定端到端路径来与所有功能的情况相匹配。
For example, security and other non-functional requirements are end-to-end notions that will affect quality of service of your SOA.
例如,安全和其他非功能的需求是将影响SOA的服务质量的点到点的概念。
IBM mashup Center is an end-to-end enterprise mashup platform, supporting rapid assembly of dynamic web applications with the management, security, and governance capabilities it requires.
IBMmashupCenter是一个端到端的企业级mashup平台,支持动态web应用的快速组装,提供相关IT所需的管理、安全性和治理功能。
We'll close this discussion with a look at several up-and-coming content formats, security protocols, and tools for implementing end-to-end wireless security.
我们将通过研究几种很有前途的(用于实现端到端无线安全性的)内容格式、安全性协议和工具来结束这个讨论。
Although this provides relevant security through the end-to-end communication link, the books-seller's security policy is violated.
虽然这种方法在端对端通信链路中提供了适当的安全性,但违反了图书销售商的安全性策略。
Instead of organising engineers into separate groups focused on things such as search, security and networking, Larson-Green realised a more "end-to-end" approach was needed.
以往产品开发的工作方式是把工程师分成不同小组,每个小组专注于某一部分:如搜索,安全和网络。与之相反,拉尔森·格林认识到更注重“终端到终端(end - to - end)”的做法是必要的。
AmberPoint saw it as autodiscovery of dependencies and “rogue services”, light-weight security, monitoring and end-to-end fault analysis.
AmberPoint将SOA治理看成一种自动发现依赖关系及“流氓服务”的机制,以及一种轻量级安全、监控和端到端错误分析的机制。
JXTA also has support in the authentication and authorization areas providing end-to-end application security. The authors also commented on the reliable multicast feature in JGroups framework.
JXTA还支持认证和授权,提供了端到端的安全性。
An end-to-end Cisco network foundation provides the security, bandwidth, upgrade flexibility and support your business needs.
一个端到端思科网络基础,提供了安全,带宽,升级的灵活性和支持您的业务需求。
Solution providers in the it and the OT ecosystems must join hands to deploy end-to-end cyber security solutions for industrial systems.
IT和OT生态系统的方案供应商必须携起手来,部署工业系统端到端的网络安全解决方案。
Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.
从思科出版社帮助网络专业人员安全的关键数据和资源的安全题目,防止和减轻网络攻击,并建立端到端的,自防御网络。
Of course, the end of our combat mission in Afghanistan doesn't mean the end of challenges to our security.
当然,阿富汗战事结束并不意味着对我们的安全的挑战的结束。
Of course, the end of our combat mission in Afghanistan doesn't mean the end of challenges to our security.
当然,阿富汗的战斗任务的结束并不意味着我们的安全面临的挑战不复存在。
Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.
基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议。
Air interface security and end-to-end encryption a re offered by TETRA to protect data during the entire transmission.
数字集群系统TETRA提供空中接口加密和端-端加密以实现通信的机密性。
应用推荐