• 给出了一个SET交易安全实现模型保证了交易的有效性机密性完整性不可抵赖性。

    Finally, it presents a secure implementation model of SET transaction, which ensures the validity, confidentiality, integrity and non-repudiation of transaction.

    youdao

  • 安全模型要求能够交互标识每个组件可以网络体系结构级别通过使用通用应用程序标识实现

    The security model requires only that each of the components can be identified in an interaction, which can be achieved at network architecture level or through use of generic application identities.

    youdao

  • UDDI安全模型注册中心结点策略以及它们实现集合定义

    The UDDI security model is defined by the set of registry and node policies and their implementations.

    youdao

  • 共同思路我们消息传递实现安全模型需要我们使用消息传递的方式保持同步

    The common thread is that the security models we implement for messaging need to keep pace with the ways in which we use messaging.

    youdao

  • 使用EJB安全模型调用服务实现会话ejb时,将实现授权处理

    Authorization is achieved when the service implementation, session EJB, is called using the EJB security model.

    youdao

  • 实现扩展J2EE安全模型JACC提供程序复杂任务轻视

    Implementation of a JACC provider that extends the J2EE security model is a complex task and should not be undertaken lightly.

    youdao

  • JACC实现标准J2EE安全模型提供了良好支持

    JACC provides good support for implementing the standard J2EE security model.

    youdao

  • 受到广泛认可行业指导原则将能力成熟度模型集成(Capability Maturity Model Integration,CMMI)3-4级别(请参见 参考资料)作为实现企业SOA安全战略基础

    The accepted industry guideline is Capability Maturity Model Integration (CMMI) levels 3-4 (see Resources as a basis for pursuing an enterprisewide SOA security strategy.

    youdao

  • WebSphereAppplicationServerWeb服务安全性(WS-Security)功能通过声明性模型使得可以在部署 Web 服务实现时启用这些功能。

    The WebSphere Appplication Server's WS-Security function allows the enablement of capabilities during deployment of the web services implementations through a declarative model.

    youdao

  • 使用数据源安全数据结构、数据质量、数据标准整个数据模型的有关决策一般需要真正实现开始之前完成

    Decisions about data sources to be used, security, data structure, data quality, data standards, and an overall data model will typically need to be completed before actual implementation begins.

    youdao

  • 元数据模型事件检验安全定义实现紧密集成

    The metadata model is also tightly integrated with the definition and implementation of the event validation and security.

    youdao

  • 在一定程度上,由于使用DOM模型实现规范化简单一种方法,因此XML安全被设计为操作XML的DOM表示

    Partly because canonicalization is most easily implemented using a DOM model, the XML security libraries are all written to work with DOM representations of XML.

    youdao

  • 分布式环境安全机制实现一种高级复杂安全模型如图1所示。

    Distributed environment security implements an advanced and complex security model as shown in Figure 1.

    youdao

  • 最后使用此策略构造了一个基于属性证书授权访问控制模型,能够灵活方便实现电子政务中的安全访问控制。

    At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.

    youdao

  • Web服务环境选择实现安全模型时,安全报头标记受信任上下文都是重点考虑特性

    Security header tokens and trusted context are important features to consider when choosing and implementing the security model for your Web services environment.

    youdao

  • 上面两图可知:身份验证通过交换GSS - API令牌实现对于GSS - API安全模型非常典型

    As you can see in the above figures, the authentication is achieved by exchange of GSS-API tokens, which is very typical with the GSS-API security model. The key points to notice here are.

    youdao

  • 模型实现系统静态信息安全访问要求实现了权限管理动态的变化要求。

    Using this model, we can realize both the requirements of the static security policy of the system and the dynamic requirements of the real world.

    youdao

  • 模型中增加应用支持实现安全增强操作系统环境下灵活支持已有应用程序。

    By introducing application supporting layer, the model is able to support running various pre-existing applications in a secure operating environment.

    youdao

  • 基于我们提出信息安全模型设计实现一个基于该模型电子政务信息安全系统

    Based on our systemic model of information security, we design and implement a secure E-government information system.

    youdao

  • 本文P2DR(策略、防护、检测、响应)安全模型基础上,详细论述了内部网行为监管审计系统设计实现

    On the basis of the P2DR network security model, the paper discusses design and implementation of the Inner Network Behaviors Monitor & Audit System (for short NBAMS).

    youdao

  • 采用消息过滤算法可以在支持对象模型多级安全系统实现强制访问控制

    Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.

    youdao

  • 基于模型设计实现一个安全电子政务信息系统

    Based on this model, we design and implement a safety electronic politics information system.

    youdao

  • 基于模型我们设计实现一个安全电子政务信息系统

    Based on the model, we design and implement a secure E-government information system.

    youdao

  • 文中研究实现主动网络安全传输模型

    Research and implement one kind of secure transmission model based on active network.

    youdao

  • 本文国家863项目支持下,以实现灵活安全而且高效模型目标,对面向XML文档访问控制进行了全面的研究

    Supported by a National 863 project, implementing flexible, security and effective model as objective, research on access control for XML documents is conducted in this paper.

    youdao

  • 通过分析r BAC模型结构,提出并设计实现统计管理系统数据库安全访问控制方法

    A novel method for designing and implementing database safe access control in a statistic management system is proposed on the basis of analyzing RBAC model.

    youdao

  • 完善的安全体系采用灵活的基于角色访问控制模型实现灵活的访问控制体系。

    Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.

    youdao

  • 这个访问控制模型保护企业资源安全,同时又能实现协作环境内的资源共享

    This AC model can protect the assets and share the resource in collaborative environment.

    youdao

  • 提出安全通信协议模型EABRA通过模型可以简单有效实现网络安全通信。

    This paper presents a kind of secure communication protocol model-EABRA, by which network security communication can be realized easily and efficiently.

    youdao

  • 提出安全通信协议模型EABRA通过模型可以简单有效实现网络安全通信。

    This paper presents a kind of secure communication protocol model-EABRA, by which network security communication can be realized easily and efficiently.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定