The way in which people use social space reflects their social relationships and their ethnic identity.
人们使用社会空间的方式反映了他们的社会关系和民族身份。
The system might use a smart identity card, or a digital credential linked to a specific computer and would authenticate users at a range of online services.
该系统可能使用智能身份证或连接到特定计算机的数字证书,并在一系列在线服务中认证用户。
Should anyone else ever gain access to the private key, they can then use it as "proof" of identity and act as you.
其他任何人只要能够访问该私钥,他接下来就可以用它来“证明”身份,并以您的名义进行活动。
If the conversation includes account Numbers and personal information, she can use that to commit identity theft.
如果这个会话中包含帐号和个人信息,那么她就可以使用这些信息窃取他人的身份了。
Where the “identity crisis” comes is the persistent and pervasive use of what I consider, spammy handles in blog comments.
我所考虑的是,在博客评论中不断和到处使用的垃圾马甲造成了“身份危机”。
Right away, a default user registry is enabled out-of-the-box for better identity management, and a secure service integration bus enforces the use of secure transport protocols.
这样可以立即启动缺省用户注册表以实现更完善的身份管理,并且安全服务集成总线可以强制使用安全传输协议。
Should anyone else ever gain access to the private key, they can then use it as "proof" of identity and act as you; it is like a password, only more secure and more difficult to change.
如果其他任何人能够访问私钥,他们接下来就可以用它来“证明”身份,并以您的名义进行活动;私钥很像密码,只是更安全,更改比较困难。
Ideally, what should happen next is that another component will look at the identity in the certificate and then use that identity to make an authorization decision.
接下来理想的情况应该是另一个组件查看证书中的身份,然后使用该身份做出授权决策。
At this point, we have only to exchange the caller's role with a local service identity and we use an AAA Info file to do that.
在这一点上,通过本地服务身份我们只交换调用方角色,且我们使用AAA信息文件来这样做。
You use SCDL to define security permission and identity.
要使用SCDL来定义安全权限和标识。
Avoid IDENTITY and SEQUENCE if possible, but otherwise use a large cache of values.
尽可能避免IDENTITY和SEQUENCE,如果不能避免,则使用较大的缓存。
Alternatively, you could define the primary key to use Identity value generation at the time you were defining the table and adding the primary key column itself.
您还可以选择,定义主键值,来在定义表格和添加主键值列本身时使用identity值生成。
Acme's lead data and application architects want to use the DB2 Identity Value Generation function to remove that burden from the business logic of their various applications.
Acme的主要数据和程序结构想要使用DB 2IdentityValueGeneration功能来从不同程序的业务逻辑这样的重担移去。
The STkt response message includes first the session key for use between the client and targeted server and then also the identity of the client.
STkt响应消息包含在客户端与目标服务器之间使用的会话密钥,还包含客户端的身份。
There are many options that you can use when you create the IDENTITY column and SEQUENCE object.
在创建identity列和SEQUENCE对象时,可以使用很多选择。
Identity provider or IdP based on a request of some sort from a relying party A.K.A. Service provider or SP, and they contain statements that service providers use to make access control decisions.
断言通常通过基于某种依赖方(也称为服务提供商或SP)请求的断言方(也称为身份提供商或IdP)创建,它们包含服务提供者用于访问控制决策的语句。
The AAA framework allows DataPower devices to use a broad variety of methods for extracting user passwords, security tokens and other identity information from incoming requests.
AAA框架允许DataPower设备使用各种方法,从传入的请求提取用户密码、安全令牌和其他标识信息。
Notice that as a mapping target, we use the identity used by the IBM WebSphere Application Server, and it will be encrypted into the LTPA token.
注意,我们使用IBMWebSphereApplicationServer使用的身份作为映射目标,它将被加密到ltpa令牌中。
The idea is to capture the identity of a radio button the user clicked and use that to create an XPath statement that populates the editor with the appropriate data.
其思想是获取用户单击的单选按钮的标识,并使用它创建xpath语句,后者使用适当的数据填充编辑器。
The login modules use the NameCallback callback to retrieve the client's identity, and build a subject that is used to execute the code in the application server.
登录模块使用NameCallback回调以检索客户机的标识,并构建用于在应用服务器中执行代码的主题。
The basic WSTK identity service is used for authorization (if a user exists and the password matches they are authorized to use the system).
基本的WSTK标识服务用来进行授权(如果用户存在且与密码匹配,他们将被授权使用系统)。
Researchers will study how to use signatures, fingerprints, iris patterns, face recognition technology and voice scans to confirm the identity of computer users.
研究人员将会集中研究如何利用签名、指纹、虹膜信息、面相和声音识别等来确认网络使用者身分。
What ideally should happen next is that another component will look at the identity in the certificate, and then use that identity to make an authorization decision.
接下来理想的情况应该是另一个组件查看证书中的身份,然后使用该身份做出授权决策。
This use case explores a scenario for identity management and user provisioning with policy enablement that illustrates that re-use can enable business and IT to optimize common processing.
这个用例研究了一个启用了策略的身份管理和用户提取的场景,说明了重用可以使业务和IT 实现优化常见的信息处理。
By making heavy use of URIs, RDF seeks to minimize ambiguity about the identity of components of these statements and thus make them formal enough for machine processing.
通过大量使用URI,RDF试图最小化这些语句组件标识的模糊性,从而使它们具有足够的常规性以方便机器处理。
A key to the illicit trade is use of a network by buyers and sellers that conceals their identity.
买家和卖家利用网络进行非法交易的关键在于可以隐藏身份。
You must retrieve the current identity and then use a mapping function to come up with a new identity.
您必须检索当前标识,然后使用映射函数生成一个新的标识。
You must retrieve the current identity and then use a mapping function to come up with a new identity.
您必须检索当前标识,然后使用映射函数生成一个新的标识。
应用推荐