起初对安全响应时间及服务可用性的担忧已在许多组织中减少。
Initial concerns about security response time and service availability have diminished for many organizations.
在攻击的响应方面,其一,提出了一个基于IS P域内的安全响应方案。
For the attacking response, first, we put forward a secure response scheme which is grounded on ISP domain.
DataPowerWeb服务代理现在将安全响应发送到初始echoservice请求。
The DataPower Web Service Proxy now sends the secured response to the initial EchoService request.
组织需要从分层的安全模型转到全局安全模型上来,其中包含了业务流程、用户与系统,他们共同作为整个安全响应模型的组成部分。
The organizations have to move from a layer specific security model to a holistic one which includes business processes, users and systems as part of the overall security response model.
响应模板中包含类型安全的值对象信息图子集,这些信息是用户在请求模板中请求的。
The response template contains a type safe subset of the value object information graph requested by the user in the request template.
典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.
响应模板中包含值对象信息图的安全子集,这些信息图是用户在请求模板中请求的。
The response template contains a safe sub-set of the value object information graph requested by the user in the request template.
可以自动响应并围绕着问题、安全威胁以及系统故障而工作,以实现自修复。
It can respond automatically and work around problems, security threats, and system failures in order to be self-healing.
例如,收到一个SOAP请求时的策略,这个策略会在SOAP消息头里验证安全信息来确认用户也许可以接受先前缓存的响应数据。
For instance, a policy that receives a SOAP request validates security information in the SOAP header to validate that a user may receive previously cached response data.
安全的响应包含所请求的SAML安全令牌。
The secured response contains the requested SAML security token.
SCT由客户端包含在所有对服务的请求中,作为安全对话的一部分,并被服务在所有响应中引用。
The SCT is included by the client in all requests to the service as part of the secure conversation, and referenced by the service in all responses.
注意这样做是不安全的,因为如果服务器用附件响应,解析就会失败。
Note that this is unsafe because it will fail if the server replies with an attachment.
该视频系统同时还有一些非军事应用的潜在市场,如国土安全、危机响应演习等。
The video training system also has other potential nonmilitary applications, such as for homeland security and emergency response training exercises, the company said.
将创建请求和响应处理规则来按照要求操作SOAP消息,以遵循所需的安全策略。
Request and response processing rules are created to manipulate the SOAP message as required to conform to the desired security policy.
静态SQL有百益而无一害——使响应时间稳定、减少安全风险、增加吞吐量和增强可管理性。
You get all of the gain of static SQL, including making response time stable, reducing security risks, increasing throughput, improving manageability, and none of the pain.
服务器相信会话已处于活动状态,从而返回一个确信响应给新用户,这表明一个全新的会话被创建且凭证已被安全存储。
The server, believing that the session is already active, returns a reassuring response to the new user that suggests that a brand new session was created and the credentials were safely stored.
来自计算机应急响应小组(请参见参考资料)和供应商的许多最严重的安全公告都是由简单的内存错误造成的。
Many of the gravest security notices from the Computer Emergency Response Team (see Resources) and vendors are commentaries on simple memory errors.
至少,安全漏洞响应计划应该包括联系人列表、初始响应团队和基本指示。
At a minimum, security breach response plans should include a list of contacts, an initial response team, and basic instructions.
配置服务响应签名生成者安全绑定。
Configure the Service response signature generator security bindings.
配置服务响应加密生成者安全绑定。
Configure the Service response encryption generator security bindings.
用类似的方式,North展示了业务上下文是如何为关联响应、服务可用性、安全或服务变革去定义SOA需求的。
In a similar way, North shows how the business context defines SOA requirements for correlation of responses, availability of services, security or service evolution.
在某些Web服务使用情况下,用户将需要高性能、可靠的且安全的方式来传送服务请求和接收响应。
In some Web service usage scenarios, users will require high-performance, reliable, and secure ways to transfer service requests and receive responses.
让我们检查一下三种容器,其中任意一种都与您在Web服务中用于描述应用程序安全漏洞的响应类型相关。
Let's take a look at three containers, each of which is associated with a response type that you could use in describing application security vulnerability in a Web service.
Web服务的EJB组件将当前安全上下文中包含的用户名传入此响应字符串。
The Web service's EJB component inserts the user name contained in the current security context into this response string.
catalog服务示例使用了WS响应目标模式(请参阅参考资料)和安全模式等模式。
The catalog service example USES patterns such as the WS Response Template pattern (see Resources) and security patterns.
当EchoService 发出响应时,会将其发送到DataPowerWeb服务代理添加指定的安全属性。
When the EchoService issues a response, it is sent to the DataPower Web Service Proxy to add the specified security attributes.
您可以直接地eval这个响应,但使用解析器将会更安全。
You can eval the response directly, but it is safer to use a parser.
生成发送回客户机的响应时,WS - Security模块逆向处理安全流程。
When the response is generated to be sent back to the client, the WS-Security module reverses the security process.
生成发送回客户机的响应时,WS - Security模块逆向处理安全流程。
When the response is generated to be sent back to the client, the WS-Security module reverses the security process.
应用推荐