Applies an encryption policy to perform standard XML encryption of the incoming message.
应用加密策略对传入消息执行标准xml加密。
The offline policy controls backup and restore commands, and the encryption and decryption of database backup images.
离线策略控制备份和恢复命令,以及数据库备份映像的加密和解密。
However, this policy USES symmetric encryption.
然而,这个策略使用对称加密。
It then encrypts the index using a searchable encryption scheme and encrypts the unique key with an attribute-based encryption scheme under an appropriate policy.
然后它会使用可搜索的加密模式对索引进行加密,用基于属性的加密模式以恰当的手段对唯一密钥加密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
An online policy holds one or more encryption keys and rules for access control.
在线策略包含一个或多个加密密匙以及访问控制规则。
For example, an assertion from an alternative from the requester policy might simply state that it is capable of supporting encryption.
例如,来自请求方策略的替代的断言可能只是简单说明它支持加密。
This policy specifies encryption of message bodies sent in both directions, using a client-generated secret key.
这个策略使用客户端生成的保密密钥来规定发送到两个方向的消息体加密方式。
Finally, a policy specification may require that certain elements of the order are to be encrypted, denoting the encryption techniques to be used, certificates to use, etc.
最后,策略规范可能要求加密订单的某些要素,指示要使用的加密技术、要使用的证书等等。
The first change in the Listing 4 policy is not required in order to use encryption, but it's a good idea.
使用加密不需要用到清单4策略中的第一处修改,但这是个好主意。
This policy set provides message integrity through digital signature and message confidentiality through encryption.
此策略集通过数字签名来保护消息的完整性,并通过加密来保护消息的机密性。
Finally, Metro also had problems relating to the use of one-way encryption or signing reported in "Understanding WS-Policy."
最后,Metro也有关于使用单向加密或者“理解WS -Policy”中报告的签名技术方面的问题。
The only exception was for the problems relating to the use of one-way encryption or signing reported in "Understanding WS-Policy," - which have now been corrected in the CXF 2.3.1 release.
惟一例外的是关于使用单向加密或“理解WS - Policy”中报告的签名技术方面的问题—这也在CXF2.3.1中更正了。
The term WS-Policy refers to a framework that defines governance, such as the method of transport, and security, such as the level of encryption.
术语WS-Policy指定义治理(例如传输方法)和安全性(如加密级别)的框架。
To do this, select the Transform option, and drag it on the policy window before the encryption action (see Figure 16).
要执行此操作,请选择Transform选项,并在加密操作之前将其拖放到策略窗口。(请参见图16)。
The default WS-Security policy secures the message integrity via a digital signature for the body and headers, ensuring message confidentiality via encryption of the body.
缺省的WS - Security策略通过对消息正文和标题进行数字签名来保护消息的完整性,并通过加密正文确保消息的机密性。
You also need to define a WebSphere Message Broker policy to tell the system whether signing or encryption is in use and which end is doing this.
您还需要定义WebSphereMessageBroker策略,以告诉系统是否正在使用签名或加密,以及哪一端在执行签名或加密。
Mapping this policy, XML Encryption facilitates the concealment of payment information in the sales department and its disclosure in the accounts department.
通过映射这个策略,xml加密提高了销售部门支付信息的隐密性,也帮助了会计部门对此信息的解密。
But because of national security policy, which is disguised as database encryption products are not popular in the domestic market of domestic security database, but gradually disappeared.
但由于国家保密政策的限制,这些被伪装成国产的数据库加密产品并没有在国内数据库安全市场大行其道,反而逐渐销声匿迹。
For example, if a service provider's security policy declaration requires encrypted messages, the ESB can configure an encryption mediation automatically.
例如,如果服务提供者的安全策略声明要求使用加密消息,则ESB可以自动配置一个encryption中介。
IBM InfoSphere Guardium encryption Expert protects data with a policy that contains one or more encryption keys and one or more rules for access control.
IBMDatabaseEncryptionExpert使用包含一个或多个加密密匙和一个或多个访问控制规则的策略保护数据。
Abroad one-commerce security technology, although its structure or encryption technology is good, but is limited by the foreign password policy, so the strength of the common enough.
国外有关电子商务的安全技术,虽然其结构或加密技术等都不错,但受到了外国密码政策的限制,因此强度普遍不够。
Desktop or Gateway policy-based encryption and content filtering.
基于台式机或网关策略的加密及内容筛选。
Considering the characteristics of EPON, we introduce a "churning" policy and modify the process of register and OAM frames, thus to achieve an efficient authentication and encryption scheme.
重点结合EPON系统自身的特点,通过对注册过程以及OAM帧的修改,结合“搅动”策略实现了一种有效的鉴权与加密方案。
Considering the characteristics of EPON, we introduce a "churning" policy and modify the process of register and OAM frames, thus to achieve an efficient authentication and encryption scheme.
重点结合EPON系统自身的特点,通过对注册过程以及OAM帧的修改,结合“搅动”策略实现了一种有效的鉴权与加密方案。
应用推荐