• 安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。

    The end to end security model would mean that all providers give access to all trusted requesting applications.

    youdao

  • 合并了许多元素包括使用者企业家庭基站转码端到安全家庭网关启用移动宽带服务

    This incorporates many elements, including consumer, enterprise, femtocells, transcoding, end-to-end security, home gateways, and mobile broadband-enabled services.

    youdao

  • 体系结构使用WS - Security提供端到安全可能不可否认性(如果服务删除安全保存消息)。

    This architecture USES WS-Security to provide end-to-end security and possibly non-repudiation (if the service persists the inbound message before removing security).

    youdao

  • 然后必须某种可靠安全方式端到传送特定设备格式化数据

    It must then deliver data formatted for that specific device, end-to-end, in a reliable and secure manner.

    youdao

  • 例如应用程序可能不同交互中同时支持请求方提供者角色或者外部安全服务可能支持所列出的一个多个功能

    For example an application may support both requester and provider role in different end to end interactions or external security services may support one or more of the functions listed.

    youdao

  • 由于中间没有WAP网关智能应用程序可以提供无线设备可伸缩安全

    Without a WAP gateway in the middle, smart applications can provide scalable end-to-end security from the back end to wireless devices.

    youdao

  • 解决方案提供了消息级别安全安全功能合并SOAP消息中并作用于应用层因此保证端到安全

    Both solutions provide message-level security, incorporating security features in the SOAP message and working in the application layer, thus ensuring end-to-end security.

    youdao

  • NFSRPC请求可以使用密码认证能力提供了端到NFS安全支持

    The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.

    youdao

  • 每个组件可能执行安全角色方面多个选择,而必须确定路径所有功能情况相匹配

    Each of the components may have options for the way in which they fulfil their security role and end to end paths must be determined to match up the capabilities across all capabilities.

    youdao

  • 通过紧密地集成表单过程可以安全多租户环境中基于Web交互提供具有自动处理端到解决方案

    By tightly integrating forms with processes, you can provide an end-to-end solution for Web-based interactions with automated processes in a secure, multi-tenant environment.

    youdao

  • AmberPoint将SOA治理看成自动发现依赖关系流氓服务”的机制,以及一种轻量级安全监控端到错误分析的机制。

    AmberPoint saw it as autodiscovery of dependencies androgue services”, light-weight security, monitoring and end-to-end fault analysis.

    youdao

  • 我们通过研究几种很有前途的(用于实现端到无线安全的)内容格式安全协议工具结束这个讨论

    We'll close this discussion with a look at several up-and-coming content formats, security protocols, and tools for implementing end-to-end wireless security.

    youdao

  • 2显示了客户设备运行MQe如何服务器应用程序相集成,从而提供安全消息传递解决方案

    Figure 2 shows how MQe running on a client device can interact with server-side applications to provide a secure, end-to-end message delivery solution.

    youdao

  • IBMmashupCenter一个端到企业级mashup平台支持动态web应用快速组装,提供相关IT所需管理安全治理功能

    IBM mashup Center is an end-to-end enterprise mashup platform, supporting rapid assembly of dynamic web applications with the management, security, and governance capabilities it requires.

    youdao

  • 区别在于通话是加密编码,通过被称为SCIP (securecommunicationsinteroperability protocol,安全交互通讯协议)的特殊形式

    The difference is that the conversations are scrambled from end to end, using a special form of encryption called SCIP (secure communications interoperability protocol).

    youdao

  • 一个端到思科网络基础提供安全带宽升级灵活性支持业务需求

    An end-to-end Cisco network foundation provides the security, bandwidth, upgrade flexibility and support your business needs.

    youdao

  • JXTA支持认证授权提供了端到安全

    JXTA also has support in the authentication and authorization areas providing end-to-end application security. The authors also commented on the reliable multicast feature in JGroups framework.

    youdao

  • 思科出版社帮助网络专业人员安全关键数据资源安全题目防止减轻网络攻击建立端到自防御网络

    Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.

    youdao

  • ITOT生态系统方案供应商必须起手来,部署工业系统端到网络安全解决方案

    Solution providers in the it and the OT ecosystems must join hands to deploy end-to-end cyber security solutions for industrial systems.

    youdao

  • 第四,开展了安全通信研究。提供了安全调用服务的机制保证安全

    Finally, Research on safety communication, we propose a safety-invoking mechanism, ensuring end-to-end security.

    youdao

  • 相对于通信安全群组通信更为复杂基本算法系统安全协议到安全实现都还存在需解决问题

    Secure group communication is more complicated than peer to peer communication, and poses a number of challenges ranging from basic algorithms, systems and secure protocols to secure implementation.

    youdao

  • XML加密为结构数据安全交换提供了端到加密。

    XML encryption provides end-to-end security for applications that require secure exchange of structured data.

    youdao

  • 重点讲述功能安全标准采用、全系统、全生命周期三个基本方法

    The paper mainly introduced the basic methods of the functional safety standard, the three basic methods of end to end, whole system, and whole life circle.

    youdao

  • 他们服务器代表了一个玩家并且可以运行客户发送过来的命令(安全的客户端到服务器远程过程调用的方式)。

    They represent the player on the server and so have the ability to run commands (which are secure client-to-server remote procedure calls) from the player's client.

    youdao

  • RTP/RTCP协议网络实时数据提供端到传输时序重构遗失检测、数据安全拥塞控制多种服务,支持多播播网络。

    RTP/RTCP provides end-to-end transmission, timing reconstruction, frame loss detection, data security, congestion control, and other services for real-time data over multicast or unicast network.

    youdao

  • RTP/RTCP协议网络实时数据提供端到传输时序重构遗失检测、数据安全拥塞控制多种服务,支持多播播网络。

    RTP/RTCP provides end-to-end transmission, timing reconstruction, frame loss detection, data security, congestion control, and other services for real-time data over multicast or unicast network.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定