• The end to end security model would mean that all providers give access to all trusted requesting applications.

    安全模型意味着所有提供者将授予所有受信任请求应用程序访问权限。

    youdao

  • To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.

    为了解决这些问题我们需要一种具有灵活加密方案端对端安全性模型满足一系列不同需求

    youdao

  • Without a WAP gateway in the middle, smart applications can provide scalable end-to-end security from the back end to wireless devices.

    由于中间没有WAP网关智能应用程序可以提供无线设备可伸缩对端安全性

    youdao

  • Both solutions provide message-level security, incorporating security features in the SOAP message and working in the application layer, thus ensuring end-to-end security.

    解决方案提供了消息级别安全性安全功能合并到SOAP消息中并作用于应用层因此保证端到端的安全。

    youdao

  • The need for an end-to-end security solution is on the horizon.

    于是就出现了对端到端安全性解决方案的需求

    youdao

  • End-to-end security must be enabled to use this feature.

    必须启用全程安全性才能够使用特性。

    youdao

  • To provide end-to-end security, we need to secure XML documents.

    为了提供端到端安全性我们需要确保XML文档的安全。

    youdao

  • When securing digital information, it is important to implement end-to-end security.

    保护数字信息时,实现全程安全性重要的。

    youdao

  • The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.

    NFSRPC请求可以使用密码认证能力提供了端到端的NFS安全支持

    youdao

  • This incorporates many elements, including consumer, enterprise, femtocells, transcoding, end-to-end security, home gateways, and mobile broadband-enabled services.

    合并了许多元素包括使用者企业家庭基站转码端到端安全性家庭网关启用移动宽带服务

    youdao

  • For example, security and other non-functional requirements are end-to-end notions that will affect quality of service of your SOA.

    例如安全和其他功能需求影响SOA服务质量的点到点的概念

    youdao

  • In order for the human task administration functions to work properly, you must have end-to-end security enabled.

    为了人工任务管理功能正常工作必须启用全程安全性

    youdao

  • We'll close this discussion with a look at several up-and-coming content formats, security protocols, and tools for implementing end-to-end wireless security.

    我们通过研究几种很有前途的(用于实现端到端无线安全性的)内容格式、安全性协议工具结束这个讨论

    youdao

  • Although this provides relevant security through the end-to-end communication link, the books-seller's security policy is violated.

    虽然这种方法通信链路提供了适当安全性,但违反了图书销售商安全性策略。

    youdao

  • IBM mashup Center is an end-to-end enterprise mashup platform, supporting rapid assembly of dynamic web applications with the management, security, and governance capabilities it requires.

    IBMmashupCenter一个端到端的企业级mashup平台支持动态web应用快速组装,提供相关IT所需管理安全性治理功能

    youdao

  • AmberPoint saw it as autodiscovery of dependencies androgue services”, light-weight security, monitoring and end-to-end fault analysis.

    AmberPoint将SOA治理看成自动发现依赖关系流氓服务”的机制,以及一种轻量级安全监控端到端错误分析的机制。

    youdao

  • Instead of organising engineers into separate groups focused on things such as search, security and networking, Larson-Green realised a more "end-to-end" approach was needed.

    以往产品开发工作方式工程师分成不同小组,每个小组专注于某一部分:搜索安全和网络。与之相反拉尔森·格林认识到注重“终端到终端(end - to - end)”的做法必要的。

    youdao

  • This architecture USES WS-Security to provide end-to-end security and possibly non-repudiation (if the service persists the inbound message before removing security).

    体系结构使用WS - Security提供端到端安全和可能不可否认性(如果服务删除安全保存消息)。

    youdao

  • JXTA also has support in the authentication and authorization areas providing end-to-end application security. The authors also commented on the reliable multicast feature in JGroups framework.

    JXTA支持认证授权提供了端到端的安全性

    youdao

  • An end-to-end Cisco network foundation provides the security, bandwidth, upgrade flexibility and support your business needs.

    一个端到端思科网络基础提供安全带宽升级灵活性支持业务需求。

    youdao

  • Solution providers in the it and the OT ecosystems must join hands to deploy end-to-end cyber security solutions for industrial systems.

    ITOT生态系统方案供应商必须起手来,部署工业系统端到端的网络安全解决方案

    youdao

  • Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.

    思科出版社帮助网络专业人员安全关键数据资源安全题目防止减轻网络攻击建立端到端的自防御网络

    youdao

  • Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.

    基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议

    youdao

  • Based on a specific company project, this paper designed specific security email system, in order to achieve end to end secure email transmission.

    本文公司具体项目为背景,设计专用安全电子邮件系统实现电子邮件的安全传送

    youdao

  • Finally, Research on safety communication, we propose a safety-invoking mechanism, ensuring end-to-end security.

    第四,开展了安全通信研究。提供了安全调用服务的机制保证到端的安全。

    youdao

  • XML encryption provides end-to-end security for applications that require secure exchange of structured data.

    XML加密为结构数据安全交换提供了端到端的加密。

    youdao

  • XML encryption provides end-to-end security for applications that require secure exchange of structured data.

    XML加密为结构数据安全交换提供了端到端的加密。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定