要设置消息流安全性,您需要完成以下任务。
To set up message flow security, you need to complete the following tasks.
程序信息流安全是信息安全的一个重要研究方向。
Ensuring information flow security of programs is an important research direction of information security.
安全进程代数可以作为信息流安全的基础理论框架。
Security Process Algebra forms a basis for secure information flow theory.
文章在安全进程代数理论框架内讨论信息流安全模型。
A process algebraic approach to the modelling of information flow security is explained.
如上文所述,消息流安全性实现依赖于外部安全性提供者。
As mentioned above, the message flow security implementation depends on an external security provider.
分析了当前采空区场流安全理论研究的最新进展和发展趋势。
The current progress and development trend in the study of safety theory of field flow in goaf are analyzed.
基于人类的社会智能特征,提出了一种网络信息流安全环模型。
This paper puts forward a security-ring model for network information flow based on human social intelligence.
本发明还提供了一种用于实现媒体流安全的安全参数协商装置。
The present invention also provides a safe parameter negotiate device for implementing medium stream.
在下文中,我们将给出一个示例,为您展示如何设置消息流安全性。
In the following sections, an example shows you how to set up message flow security.
您将测试两个场景:一个使用从HTTP报头中提取的身份测试消息流安全性功能。
You are going to test two scenarios: one for testing message flow security functions using the identity extracted from the HTTP header.
传统的RBAC访问控制模型已经不能表达复杂的工作流安全访问控制约束。
The traditional RBAC model cannot express complicated workflow secure access control constraint.
补货管理对连锁超市的日常销售、营销、顾客满意度、供应商满意度、现金流安全都有十分重要影响。
Replenishment management plays a very important role in daily sales, marketing, and customer satisfaction as well as cash flow safety.
继承类内的信息流安全特性可以使用传统的信息流研究方法,继承类间的信息流安全特性则使用基于流的概念进行研究。
We consider research for the security properties of information flow of active network as properties of the inheriting class inner flow and flow among different inheriting classes.
如果没有启用这种消息流安全性,WebSphereBroker中的默认安全性工具将基于传输机制所提供的安全性。
Without enablement of this message flow security, the default security facilities in WebSphere message Broker are based on the security provided by the transport mechanism.
要配置消息流安全性,需要使用外部安全性提供者来强制实施安全性,例如TivoliDirectoryServer。
To configure the message flow security, an external security provider is required, such as Tivoli Directory Server, to be used as the security enforcement.
不过,如果您知道当信号可能到达时,程序不可能使用处理器那个时刻所使用的流,那么就是安全的。
However, if you know that the program cannot possibly use the stream that the handler USES at a time when signals can arrive, you are safe.
当前所用的DSL将会变得更加强大,当然复杂性也会不断攀升,它会整合安全、验证及应用流。
The DSL's that are currently in use will continue to become more powerful and sophisticated, incorporating security, validation, and application flow.
受此影响的用例是RESTfulURL、书签支持、通过URL模式获得的安全性以及页面流验证等。
Use cases affected by this trade-off are RESTful URLs, bookmarking support, security through URL patterns, and page-flow validation, to mention a few.
然后本文将介绍如何在MessageBroker消息流中使用这些节点,包括缓存策略和安全注意事项。
The article then shows you how to use these nodes within message Broker message flows, including caching strategy and security considerations.
对于Web应用程序,安全静态分析最重要的类型叫做污染流分析。
For Web applications, the most important type of security static analysis is called taint flow analysis.
Datapower设备是一个硬件设备,旨在提供以下功能:xml转换、用于调用企业服务的安全访问通道和基本的中介流功能。
The Datapower appliance is a hardware appliance designed to provide: XML transformation, a secure access channel to invoke enterprise services, and basic mediation flow capabilities.
安全性配置文件中定义的安全性功能是在消息流的输入和输出/请求节点上执行的。
The security functions defined in a security profile are performed on input and output/request nodes of a message flow.
您还应该了解现有的各种企业组件,如安全机制、业务流程和业务规则引擎、工作流引擎和打包的应用程序。
You should also be aware of existing enterprise components, such as security mechanisms, business process and business rules engines, workflow engines, and packaged applications.
基本服务可以与支持工作流、安全性和审计日志记录的通用企业组件集成。
Base services can be implemented to integrate with common enterprise components that support workflow, security, and audit logging.
如果希望实现安全的特殊版本控制工作流,让两个开发人员可以在咖啡馆中通过无线网络一起工作,那么可以试试下面的方法。
If you want to enable a secure, ad-hoc version control workflow, for instance, two guys on a wireless network in a coffee shop, then try out this hack.
在部署过程中,将检查消息流中使用的安全性配置文件是否存在。
During the deployment process, the existence of the security profiles used in the message flows is checked.
您可以在消息流级设置安全性配置文件属性,以便在节点安全性配置文件的属性留空时,节点能够继承这些属性。
You can set the security profile property at the message flow level, so that a node can inherit it if the node security profile property is left blank.
下图中的协议栈之间的黑线流向代表安全上下文的流而不是信息流。
The black lines flowing between the stacks in the figures below represent flow of security context not information flow.
这样的内容包括音频或视频的实时转播流、安全帐户信息或事务的链接和大型数据流。
Examples of such content include live audio or video broadcast streams, links to secure account information or transactions, and large data streams.
处理复杂数据流的难度导致了第三条准则的出现:围绕XML处理管道来设计应用程序,从而让数据流更容易进入安全威胁评估。
The difficulty of dealing with intricate data flow leads to the third principle: Design your applications around XML processing pipelines to make data flow easier to factor into threat assessment.
应用推荐