议会发言人昨日表示,伊拉克立法者预计将在周三之前就一项安全协议进行投票,该协议将使美军在伊拉克驻扎至2011年底。
Iraqi lawmakers are expected to vote on a security agreement by Wednesday, which will keep the US troops here until the end of 2011, the parliament's speaker said yesterday.
建立文档交换协议和安全协议。
安全性——测量对安全协议和安全机制的遵从性。
Security a "measures the adherence to security protocols and mechanisms."
它用于创建应用程序协议和安全协议之间的分离关系。
It is designed to create a separation of concerns between application protocols and security protocols.
安全协议的设计和分析是复杂而且容易出错的。
The analysis and design of Security Protocol is always complex and error prone.
美伊安全协议要求美军在2011年底前全部撤出伊拉克。
The U.S.-Iraq security agreement calls for the withdrawal of all U.S. forces by the end of 2011.
安全协议提供安全服务,是保证网络安全的基础。
Security protocols are the basis of security which provide security services in network.
安全协议的形式化验证是网络安全的一个重要领域。
Formal authentication of security protocol is an important field of network security.
像所有伊拉克记者期待的一样,布什称赞了于伊拉克缔结的安全协议。
Bush had been lauding the conclusion of a security pact with Iraq as journalists looked on.
电子商务中的安全协议主要采用SSL协议和SET协议。
E-Commerce security protocol usually adopts SSL and SET protocol.
策略定义了安全协议及TCS和服务之间的安全互通性所需的信任通道。
The policy defines the secure protocol and credential passing required for secure interoperability between the TCS and the service.
因此,安全协议自身的安全性成了网络安全的关键问题之一。
Therefore, the security of security protocols has become one of the key problems of network security.
维护机密性和完整性的典型解决方案涉及使用现有的安全协议和加密算法。
Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.
美国和伊拉克已经签署了一项新的安全协议,允许美军继续驻扎在伊拉克。
The United States and Iraq have already concluded a new security pact that allows U.S. troops to remain in the country.
文章从两个角度介绍安全协议形式化验证的方法:证明与证伪。
This paper introduces tools of verification and falsification and then compare and analyses their characteristic.
该逻辑不但可以用来分析安全协议,而且可以用来设计安全协议。
The logic can be used not only to analyze security protocols, but also to design security protocols.
此模式将支持各种传入安全协议,而且同时能简化其他ESB组件中的安全措施。
This pattern would support a wide range of incoming security protocols while simplifying security in other ESB components.
相关网络安全协议应运而生,而它们的基础都是安全有效的加密算法。
Then on the basis of safe and high efficient encryption algorithm, some related network protocols are produced.
典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.
7月1日,IBM表示它将收购BigFix以加强其智能数据中心和安全协议。
On July 1, IBM said it was buying BigFix to accelerate its smart data center and security initiatives.
上述事件发生在土耳其、美国和伊拉克三方于4月签订了安全协议之后。
This follows a security pact signed in April between Turkey, America and Iraq.
为SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法的库。
Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.
远程主机shell访问(取代telnet和rlogin明文,不安全协议)。
Remote host shell access (supersedes Telnet and rlogin clear text, insecure protocols).
如,可以使用将安全协议信道置于HTTP传输信道之上来提供安全的HTTP传输通信。
For example, a security protocol channel can be layered over HTTP transport channel to provide secure communications over HTTP.
安全漏洞是在对安全协议的具体实现中发生的错误,是意外出现的非正常情况。
Security vulnerabilities are on security agreement in the concrete implementation errors, is the accident appear abnormal conditions.
白宫称,布什此行是为了庆祝双方缔结的安全协议,战略框架协议及武装部署协议。
Bush's trip was to celebrate the conclusion of the security pact, called the Strategic Framework Agreement and the Status of Forces Agreement, the White House said.
因此,分析、设计安全有效的安全协议是计算机通讯领域中一个极为重要的研究课题。
So the analysis and design for efficient security protocol is more important research problem in the field of computer communication.
为了解决P 2 P的安全问题,可以采取传统的安全技术,如安全协议、数字证书等等。
Traditional security technology, such as security protocols, digital certificate, can be used to solve some security problems in P2P.
为了解决P 2 P的安全问题,可以采取传统的安全技术,如安全协议、数字证书等等。
Traditional security technology, such as security protocols, digital certificate, can be used to solve some security problems in P2P.
应用推荐