给出了构件安全性描述模型,在此基础上,提出了基于安全威胁模型的分布式构件集成方法,并给出了一个实例。
And then, a way about distributed components assembling based on security menace modular is put forward, an example is given.
正如上面所描述的那样,对于针对抵赖的安全性来说,在待签名的应用数据中同时加入现时标志和目标接收方的身份是非常重要的。
As described above, it is important for security against repudiation to add both a nonce and the identity of the intended recipient to application data to be signed.
描述其位置、系统、访问方法、源数据流通和更新频率、数据安全性和数据质量。
Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.
该元数据描述相关的连接方面,例如安全性。
The metadata describes the relevant connectivity aspects, such as security.
我们简要地描述了DB 2架构、后台进程、内存模型、安全性、工具等方面。
We briefly described the DB2 architecture, background processes, memory model, security, tools, and so on.
我们之所以把它们包括在架构之中,是因为我们希望提供一个全景——要完整描述IT安全性就必须也照顾到云服务的非特定于云计算的组成部分。
We include them in the architecture because we want to provide the complete picture; a full treatment of it security must account for a cloud service's non-cloud-specific components.
如果您把Web服务定义为“用WSDL描述的某种东西”,那么用一致的方式跨非soap服务为您描述和实现安全性就需要做更多的工作。
If you define Web services as "something described by WSDL", then more work needs to be done to describe and implement security for you in a consistent fashion across non-SOAP services.
这一简要回顾为我们稍后将在文章中描述的一些概念打下了基础,特别是关于DominoWeb服务器安全性的那些概念。
But a quick overview will help lay the groundwork for some of the concepts we describe later in the article, particularly concerning Domino Web server security.
创建ContentTemplates,以描述Web内容的属性,例如,工作流、安全性和组件属性。
Create the content Templates to describe the attributes for your Web content, e.g workflow, security and component attributes.
本文描述如何设计和开发一种特定类型的安全性插件,这种安全性插件使用DB2数据库存储身份验证信息。
This article describes the design and development process of a specific type of security plug-in, one that uses a DB2 database to store authentication information.
本系列的第10部分描述了如何部署定制的安全性插件。
Part 10 of this series described how customized security plug-ins can be deployed.
如果您希望添加安全性或对导出的应用程序EAR中的其它部署描述符进行修改,请使用AAT工具。
If you want to add security or make other deployment descriptor changes in the exported application EAR, then use the AAT tool.
可以使用最朴实的语言来描述它的安全性:它可以防止纯文本凭证通过线路传递出去。
It is secure in only the most lenient definition of the word: it keeps plaintext credentials from going out over the wire.
通过比较实现安全性的不同方式,从全新的视角描述您熟悉的平台的安全性。
Provide a fresh perspective on security on the platform you are familiar with, by comparing it to a different way of implementing security.
另外,它也应该提高安全性,提供一组普通数据通过电子入口给有关部门,这些数据包括20份文件,文件中描述了谁来运输,运输什么,从什么地方运输,运输到哪里以及收货人是谁。
It should also improve security, providing a common data set that gives the authorities electronic access to some 20 documents that describe who is shipping what, whence, whither and to whom.
所以,就无法为这类问题方法设置隔离级别(isolation level)、访问目的(access intent)、安全性(security)和方法许可(method permission)等这些部署描述符属性。
So, deployment descriptor properties such as isolation levels, access intent, security, method permissions, and so on cannot be set for such problem methods.
要在EAR部署描述符中创建安全性角色,使用RoleMapping按钮。
To create the security roles in the EAR deployment descriptor, use the role Mapping button.
例如,Security的主题题目既可以对安全性的内容进行分类,又可以描述Web站点或帮助系统内容中的安全性。
For instance, the subject topic for security can both classify content about security and describe security within the Web site or help system content. Figure 5 illustrates this scenario.
部署描述符中的安全性配置。
注意:DB 2UD b手册有一节详细描述了如何开发安全性插件,并解释了安全性插件api。
Note: the DB2 manuals have a section that describes in detail how to develop security plug-ins, as well as explanations of the security plug-in APIs.
接下来的小节描述如何保障DataWebService应用程序在HTTP传输协议层的安全性,以及如何将它连接到WebSphere的安全性框架。
The following sections describe how to secure a Data Web Service application at the HTTP transport protocol layer and how to hook it into WebSphere's security framework.
可以按照处理会话Bean安全性相同的方式使用部署描述符和安全注释配置实体Bean安全性。
You can configure entity bean security using the deployment-descriptor and security annotations the same way as we did for session bean security.
在这一部分还简要的描述了RSA算法的性能分析和安全性分析。
Return the function analysis and safety analysis that the synopsis described the calculate way of RSA in this part.
尽管越来越多的家长关注其对安全性,但是尚没有描述了关于背包负载对儿童脊柱影响的成像研究。
Despite growing concern among parents about safety, there are no imaging studies which describe the effect of backpack loads on the spine in children.
为了加快工作票的生成速度和保证操作过程的安全性,提出了一种基于规则的工作票描述语言自动生成算法。
To speed up the generating procedure of work order and guarantee the operation safety, a rule-based algorithm for the automatic generation of work order description language is presented.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
论文首先给出协议的形式化描述,然后讨论了协议的安全性、可鉴别性和可验证性。
This paper gives the formal description of the two-party protocol, and discusses the security, authenticability and verifiability for two-praty protocols.
同时从水质安全性角度探讨了以颗粒数作为水质替代参数进行水质描述的优越性和可行性。
From the view of the safety of water quality, this paper discusses the advantage and feasibility of describing the quality of water by particle counts instead of turbidity meters.
描述如何打开和关闭安全性。
描述如何打开和关闭安全性。
应用推荐