解决方案:调出安全组件。
只使用安全组件,并且只采用安全的方式。
集合安全组件的一个例子是企业中的部门。
An example of set security component is the departments in an organization.
树安全组件的一个例子是企业的运营区域。
An example of tree security component is the regions of operation of the organization.
使用XML文件导入安全组件。
为满足我们的安全需求,需要运行三个安全组件。
Three security components came into play to meet our security requirements.
一个安全策略中最多可以有16个不同的安全组件。
There can be a maximum of 16 unique security components in a security policy.
数组安全组件的一个例子是企业中数据的敏感级别。
An example of an array security component is the sensitivity level of data in an organization.
DBSECADM 可以像下面这样创建树安全组件
The tree security component can be created by DBSECADM as follows
单单配备安全组件已无法满足客户的需求。
Safety components alone are not enough to satisfy customer needs.
DBSECADM可以像下面这样创建集合安全组件。
The set security component can be created by DBSECADM as follows.
DBSECADM可以像下面这样创建数组安全组件。
The array security component can be created by DBSECADM as follows.
这可以确保公共语言运行时识别新的安全组件。
This ensures that the new security component will be recognized by the common language runtime.
根据新安全组件的复杂性和目的,可能需要更改其配置。
Depending on the complexity and purpose of the new security component, you might need to change its configuration.
硬件安全组件:专业的方干扰存储器安全硬件和密钥管理。
Hardware security Module: dedicated security hardware for tamper proof storage and management of keys.
实验结果表明该机制能有效地实现网络安全组件的协同响应。
The experimental results demonstrate that the mechanism can implement the collaborative response of security components effectively.
安全组件上下文中的一个值是一个列表,包含该组件所允许的0到多个元素。
A value in the context of a security component is a list of zero or more of the elements allowed by that component.
一个系统的TCB是对该系统安全性很关键的所有安全组件的集合。
The TCB of a system is the set of all components that are critical to its security.
构建安全组件的开发人员需要在其开发环境中设置与生产环境中类似的安全机制。
Developers who are building security components require that security be set up in their development space similar to how it will be in production.
一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。
A security label belongs to a security policy and contains a value for each security component in that security policy.
业务流程和策略管理组件使用了下面的安全组件,以实现它对业务应用程序的安全职责。
The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.
因为XML安全组件使用XML文件的规范形式,语义上不重要的差异被忽略。
Because the XML Security Suite USES the canonical form of the XML documents, the semantically insignificant differences are ignored.
运用该机制对网络安全组件的协同响应进行评估实验,获得各个阶段的时间开销。
An evaluation experiment on the collaborative response of security components was performed with this mechanism, and the time costs of each process were obtained.
它是Shiro框架的核心,充当“保护伞”,引用了多个内部嵌套安全组件,它们形成了对象图。
It is the heart of Shiro's architecture and ACTS as a sort of 'umbrella' object that references many internally nested security components that form an object graph.
在黑客领域,真正的挑战是我可以做得比你更好,我可以清楚掉你的系统上装的所有防入侵安全组件。
In hacking, it is more like a challenge that I can do better than you, I can eliminate all the security components you've installed on your system to prevent hacking.
在这种情况下,应用程序可能还包含一个xml格式的文本文件,其中含有安全组件的相关信息。
In this case, the application might also include a text file that contains information about the security component in XML form.
在通过网络运行的软件或软件解决方案中,身份验证、授权、私密性、完整性和不可否认性是主要的安全组件。
Authentication, authorization, privacy, integrity, and non-reputation are the major security components of software or a software-based solution working over the network.
由于发送方的私钥用于签名(确保完整性和不可否认性),因此我们需要更改我们对安全组件使用PKI的方式。
Because the sender's private key is used for signing (integrity and non-repudiation), we don't have to change the way we use PKI for that component of the security.
由于发送方的私钥用于签名(确保完整性和不可否认性),因此我们需要更改我们对安全组件使用PKI的方式。
Because the sender's private key is used for signing (integrity and non-repudiation), we don't have to change the way we use PKI for that component of the security.
应用推荐