It allows both unilateral and mutual authentication to be accomplished without the use of secure timestamps.
它不需使用安全时间戳即可完成单向和双向身份验证。
Right away, a default user registry is enabled out-of-the-box for better identity management, and a secure service integration bus enforces the use of secure transport protocols.
这样可以立即启动缺省用户注册表以实现更完善的身份管理,并且安全服务集成总线可以强制使用安全传输协议。
It provides us with a no-administration, secure, replicated store that we can use to deploy application data flexibly, to many different kinds of clients and devices.
它为我们提供了一个不用管理的、安全的、复制的存储,我们可以使用它来灵活地将应用程序数据部署到很多不同的客户机和设备上。
The final portion of the configuration, included in Listing 11, indicates which resources you would like to secure and what type of authentication you want to use.
配置的最后一部分,包含在清单11 中,这部分指出了所需保护的资源以及所要采用的认证方式。
Usually charitable donations from corporations are spontaneous, but corporate foundations can secure more steady donations through the systematic use of the corporation's charitable funds.
通常来自企业的资产捐助都是自发的,但企业基金会可以通过系统地使用企业慈善资金来保障捐助的持续和稳定。
You could seamlessly provide a secure link between the in-game existence and his account, so that use of the scrip in the game immediately translates into an account balance change.
可以在玩家的帐号和游戏角色之间无缝地提供安全链接,所以在游戏中使用通货时,帐号的余额就会立即反映出变化。
The JMS queue will be configured to prevent unauthorized connections and to enable the use of SSL to secure the communication channel, which addresses requirement 5.
需要对jms队列进行配置,使它能够阻止未授权的连接,并启用ssl来保护通信通道,这将满足第5条要求。
Provided our privacy remains secure, there is no excuse not to use every bit of science we can in the fight against crime.
假如我们的隐私是安全的,那么没有借口在打击犯罪中不使用科技手段。
You can take several approaches to secure the use of JSON.
可以采取一些方法来保护JSON的使用。
But with the help of third-party libraries and vendor support, we have found that we can use MIDP 1.0 to implement secure applications.
但在第三方库和供应商支持的帮助下,我们发现可以用MIDP 1.0来实现安全应用程序。
Should anyone else ever gain access to the private key, they can then use it as "proof" of identity and act as you; it is like a password, only more secure and more difficult to change.
如果其他任何人能够访问私钥,他们接下来就可以用它来“证明”身份,并以您的名义进行活动;私钥很像密码,只是更安全,更改比较困难。
After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.
在身份验证之后,SSL将真正使用保密的密钥加密来保护通道,但其细节与本讨论无关。
To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.
为了便于使用,无线承载网络还支持“第二密钥”,也称作“用户安全密钥”,使用起来更加友好,但是安全性稍差。
The only difference is that, after you perform the standard security configuration, you need to secure the Web service by specifying the use of the LTPA token.
唯一的区别在于,在进行了标准的安全配置之后,您需要通过指定 LTPA 令牌的使用来确保Web服务的安全。
You can use the stub enhancer tool to save most of your effort in building J2ME-based secure Web services clients.
可以使用存根增强器工具来保存构建基于J2ME的安全Web服务客户机过程中的大部分工作。
We'll use the term resource to refer to the finest grain of functionality that we can secure with a permission; for example, a Web page or EJB method call.
我们将使用资源一词来表示可以使用权限保护的最细粒度的功能;例如,We b页或EJB方法调用。
The simplest way to use secure beans in a JSF application is to follow the same approach used in the five steps in Listing 4 of Part 3.
在JSF应用程序中使用安全bean的最简单方法就是,执行 第 3部分的清单4 中介绍的五个步骤。
Without this kind of configuration, every secure connection within a JVM must use the same KeyStore and TrustStore.
如果没有这种配置,JVM中的每个安全连接必须使用相同的KeyStore和TrustStore。
"If programmers are not motivated to, say, use secure libraries or to avoid known bad functions or techniques, where is the incentive to take the tougher path of writing secure code," Long said.
Long说:“如果程序员们不被激励以使用安全的库并避免不好的函数或技术,如何使他们走向更艰难的编写安全代码之路呢? ”。
Design principles, such as code auditing, extensive use of encryption, and careful configuration choices, combine to ensure OpenBSD's secure by default philosophy holds true.
其中的一些设计原则,如代码审核、加密处理的广泛使用以及仔细的配置选择,它们组合在一起可以确保实现OpenBSD的缺省安全的思想。
This article provides an overview of how you can use the SSL feature of IDS to secure the data in transit.
本文概述了如何使用ISD的ssl特性来为传输中的数据提供保护。
Firefox 3 has been built on top of this new platform resulting in a more secure, easier to use, more personal product with a lot more under the hood to offer website and Firefox add-on developers.
Firefox3就建立在这个新平台上,产生更加安全、更易于使用、更加个性化的产品,并且为网站和Firefox插件开发人员提供了更多内部特性。
The UsernameToken specification allows for the use of a one-way secure hash to protect the password called a digest, but this functionality is not provided in Application Server V6.
UsernameToken规范允许使用单向安全哈希来保护摘要形式的密码,但ApplicationServerv6中没有提供该功能。
While FTP remains in wide use, secure FTP (SFTP), the secure version of FTP, should be used whenever possible.
FTP仍然在广泛使用,但是应该尽可能使用FTP的安全版本Secure FTP (SFTP)。
Surely the framework might be more secure to use in this case, but think of all the includes and checks the framework would have to do before even getting to execute your code!
毫无疑问,在这里使用框架肯定能使你的代码更安全。但是想想这个重量级框架里面的众多的包涵文件和输入检查吧!
Since it is not easy to judge the direction of force in a fall, much less the extent of force, the belayer must evaluate each situation and make use of the rock for the most secure position.
由于在降落过程中很难判断受力的方向,更不用说受力的大小,因此保护者必须对每一种情况进行估量,并利用岩石取得最安全的位置。
The client and the sever applications described earlier in this article can make use of GSS-API for mutual authentication and secure data exchange.
本文前面描述的客户端和服务器应用程序可以利用GSS - API进行相互身份验证和安全数据交换。
Once standards become established, the use of biometrics could spread so that it is used to secure retail transactions made via the Internet and mobile phones, not just in shops.
标准一旦确立,生物识别技术将会被广泛应用,届时不只在商店,还会被用于确保网上与手机零售交易的安全性。
Once standards become established, the use of biometrics could spread so that it is used to secure retail transactions made via the Internet and mobile phones, not just in shops.
标准一旦确立,生物识别技术将会被广泛应用,届时不只在商店,还会被用于确保网上与手机零售交易的安全性。
应用推荐