我所关注的安全性要求是身份验证。
The security requirement I am concerned with is authentication. Consider the following two issues
消息传送的安全性要求
安全网。安全性要求,试验方法。
也就是说,设计主题树布局时需要计划安全性要求。
That is, you will need to plan for security requirements when you design the layout of your topic trees.
在这里,我将身份验证看作是两种安全性要求的结合。
Here, I'll consider authentication as involving two kinds of security requirements.
家务活用的可调转椅。安全性要求。试验。
Swivelling chair for housework, adjustable in height ; safety requirements, testing.
眼睛护具。护罩。术语形状和安全性要求。
Eye - protectors - helmets - terms , forms and safety requirements.
结论:水豆豉无明显毒性,符合食品的安全性要求。
Conclusions: Fermented soybeans in water has no apparent toxicity, and meets the requirements of food safety.
比如,它被用来测试对安全性要求苛刻的系统,比如。
It is, for example, used to test safety-critical systems, such as aeroplane flight controls.
这个功能满足了客户对使用Domino数据时改进的安全性要求。
This feature answers customer requests for improved security when working with Domino data.
表1:用SOAP - DSIG和SSL 1满足的安全性要求。
Table 1: Security requirements satisfied by SOAP-DSIG and SSL 1.
在下一部分中,我将概述一下实现以上两项安全性要求的安全性技术。
In the following sections, I'll summarize the security technologies that realize the above two security requirements.
妇科物理治疗仪属介入治疗设备,具有极高的安全性要求。
As a intervene therapy devicient, there is a crucial requirement for the physical therapeutic device used for gynecology on safety.
特别是在企业间的商业交易中,不可抵赖性的安全性要求需要得到满足。
In particular, in business transactions among enterprises, the security requirement of non-repudiation needs to be satisfied.
为了满足电磁兼容性和安全性要求,设计了EMI抑制电路。
The EMI suppression circuit is designed to meet the requirements of electromagnetic compatibility and safety.
表1总结了哪些安全性要求能通过SOAP -DSIG和ssl来满足。
Table 1 summarizes which security requirements can be satisfied by SOAP-DSIG and SSL.
现在万事俱备,但是因为安全性要求,您只能访问下载applet的服务器。
Everything is now working, but because of security requirements, you can access only the server from which you downloaded the applet.
高度集成的、基础的、安全性要求比较高的软件都需要经历检查阶段。
High integrity, fundamental, and safety critical software demands review and inspection.
控制计划是否包含所有在WP图纸上要求的控制特性以及安全性要求?
Does the Control Plan include all the WP Control Characteristics (" boated "items) and Safety Requirements as defined by WP drawings?
除了以上两项安全性要求以外,不可抵赖性也是B2B应用中相当重要的一个要求。
In addition to the above two security requirements, non-repudiation is an important requirement in B2B applications as well.
在通信可靠性和安全性要求较高的实时网络中,建议采用改进的环形拓扑。
This paper proposes an effective improved ring topology for the real-time network with high communication reliability and security.
组播有着很广阔的应用前景,越来越多的组播应用对组播提出了安全性要求。
The multicast applications are going to be widely adopted, and more and more applications need multicast provide them with secure solutions.
地下采矿机械。工作面上的移动式采掘机械。截装机和开沟系统的安全性要求。
Underground mining machines - Mobile extracting machines at the face - Safety requirements for shearer loaders and plough systems.
在这些文章中,我们强调了比较和对比技术的重要性并提出了最符合系统安全性要求的技术。
In these articles, we have emphasized the importance of comparing and contrasting technologies and coming up with those that best meet system security requirements.
请注意,这里所描述的安全性要求并不是soap所专有的,它们能适用于任何种类的消息传输。
Note that the security requirements described here are not specific to SOAP, but they apply to any kind of message transmission.
随着人们对高压容器特别是核能设备安全性要求的提高,先漏后爆准则的重要性不断增加。
With the more and more stringent safety requirements for high pressure vessels and nuclear energy equipment, the importance of LBB rule is increasing.
给出了动态群签名的正式定义,并讨论了它需要满足的安全性要求和其有效性的评价准则。
A formal concept of dynamic group signature is given. Then we discuss the requirements of security and the principles of estimating efficiency.
“网络管理器”符合业界强制的NERC关键基础设施保护标准和国家电网网络安全性要求。
Network Manager meets industry mandated NERC Critical Infrastructure Protection Standards and National Grid cyber security requirements.
混沌密码算法是一种快速加密算法,在安全性要求较高的领域中,有着非常广阔的应用前景。
As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.
混沌密码算法是一种快速加密算法,在安全性要求较高的领域中,有着非常广阔的应用前景。
As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.
应用推荐