Principal UUID: the UUID of the principal whose security attributes are described in PAC.
主体UUID:一个主体的UUID,PAC中描述了该主体的安全属性。
Its latest security initiative is a digital key fob, linked to customers' accounts, whose security code changes every 30 seconds.
其最新的安全方案为一种数码密钥卡,可同客户的帐户相连,其密码每30秒自动更换。
RSA Public Cryptogram algorithm is based on Theorem of Euler, whose security depends on the difficulty about the factor decomposed of great number.
RSA公钥密码算法的基础是欧拉定理,它的安全性依赖于大素数因式分解的困难性。
Then, we present a new designated confirmer signature scheme, whose security against adaptive adversaries is proven to depend on reasonable security assumptions.
提出一种新的指定证实人签名方案,对自适应方式攻击的安全性依靠合理的安全假设。
Here we give a simpler implement, which encrypts the sensitive data at each level with a key unique to that level, whose security is based on elliptic curve discrete logarithm problem.
该方案将对称加密算法、椭圆曲线公钥加密算法和单向函数有机结合,实现了用户使用权限和关键敏感字段的安全级别的关联。
That way, even if the program has defects (whose doesn't?), you're likely to keep the defect from turning into a security nightmare.
这样,即使程序具有缺陷(谁能无过?),也可能会避免将该缺陷转化为安全事故。
It says school helps to give children whose lives have been completely disrupted a sense of normalcy and security.
基金会表示,学校能够帮助那些生活变得支离破碎的孩子们得到正常和安全的感觉。
Next to him a man in a blood-soaked shirt, whose daughter was feared dead, sobbed uncontrollably as he blamed security lapses.
在他身边有一个男人,衬衫被鲜血浸透,他的女儿恐怕已经死去。他禁不住地啜泣,指责安全不够到位。
Most everyone from my dad's side of the family (whose names I've changed for security reasons) lived in the Iraqi capital up until 2003.
我父亲这边的家族,2003年的时候基本上都还住在伊拉克首都(出于安全考虑,本文隐去了他们的真名)。
First, I'll construct and modify an associated array whose keys (or indecies) are employee social security numbers.
首先,我将构建并修改一个两个数组,其关键字(或indecies)是员工的社会安全号。
You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.
根据web. xml文件中指定的安全性约束,通常会定义一个或多个角色,这些角色的用户将拥有访问这些脚本的适当权限。
The Home Office said there was a blanket ban on Mr Wilders entering the UK under EU laws enabling member states to exclude someone whose presence could threaten public security.
内政部表示,对Wilder先生入境的禁令,符合欧盟法律。 欧盟法律允许成员国拒绝任何可能危害公共安全的人士入境。
While the majority of modern browsers support XMLHttpRequest, there will always be a minority of users whose browsers do not, or whose browser security Settings prevent XMLHttpRequest from being used.
虽然主要的现代浏览器都支持XMLHttpRequest,但仍然有少数用户的浏览器不支持,或者浏览器的安全设置阻止使用XMLHttpRequest。
The UN Security council-whose permanent members include Britain and France but exclude Japan, India and brazil-has long looked outdated and will soon look absurd.
联合国安理会——其常任理事国包括英国与法国而不包括日本、印度和巴西——看起来早就过时,而且显得荒谬可笑。
Others should follow. The UN Security council-whose permanent members include Britain and France but exclude Japan, India and brazil-has long looked outdated and will soon look absurd.
联合国安理会——其常任理事国包括英国和法国但排除了日本,印度和巴西——早就过时了,并且很快看起来更荒谬。
Although an early start is ideal, experts say it is possible to instill empathy later - even, for example, in children whose emotional security was neglected in an orphanage.
早期开始培养同情心是最好不过了,不过专家们说,晚一点也来得及-甚至比如,情感需要在孤儿院里被忽视的孩子们。
More perplexing is the refusal of both Mr Obama and Mr Ryan to put forward a plan on Social Security, whose problems are more manageable and for which Simpson-Bowles advanced a balanced solution.
更令人困惑的是,奥巴马先生和瑞安先生都拒绝为社会保障问题提出一个方案来。 社会保障问题更容易管理,辛普森-鲍尔斯委员会已经对此有了一个平衡的解决方案。
System services such as logging, transaction management, and security frequently find their way into components whose core responsibility is something else.
系统服务(例如日志、事务管理和安全性)经常发现自己跑到了别的组件的领域里,而这些组件的核心职责是其他事情。
The snippet in Listing 9 shows how to call the EJB method under the identity of a subject whose credentials were received from the security handler.
清单9中的片段展示如何从安全处理程序接收主体的凭证,并以这个主体的身份调用EJB方法?
Ordinary people, whose personal well-being and security are assured, join together in huge Numbers to save people they do not know, and will never meet.
普通人,即使他们的个人福址及安全已被确保,为数众多的结合起来去救他们不认识,且不会再遇见的人。
The working condition of mechanical components can be indicated by their stress states, whose measurement and evaluation can also improve the security, reliability and stability of the products.
零件的应力状况能够反映机械构件的工作状态,对它的有效检测和评估为提高产品的安全性、可靠性和稳定性提供了保障。
Computer virus, whose essential component is a set of instructions, is one kind of threat to the security and integrity of computer system.
计算机病毒是由一系列电脑程序组成的,它对计算机系统的安全性和完整性构成威胁。
Second, we shall provide a shield if a nuclear power threatens the freedom of a nation allied with us, or of a nation whose survival we consider vital to our security.
第二,我们应该提供保护,如果一个核大国威胁一个国家的特权,和我们联合或一个国家的生存我们都要考虑这是关系我们的安全。
Ordinary people, whose personal well-being and security are assured, join together in huge numbers to save people they do not know, and will never meet.
个人的福祉和安全有保证的普通百姓,携手合作,大量挽救那些他们素不相识,也许永远不会见面的人。
They include International Paper Co., whose directors spent $52, 000 in 2006 to install a home-security system for CEO John V. Faraci after the company's headquarters moved to Memphis, Tenn.
公司总部迁至孟菲斯后,该公司2006年花费52,000美元为首席执行长约翰•法拉奇(JohnV.Faraci)安装了住宅保安系统。
Tonight I ask for your prayers for all those who grieve, for the children whose worlds have been shattered, for all whose sense of safety and security has been threatened.
今夜,我请求大家为所有悲伤的人们祈祷,为那些美好的生活被无情毁坏的孩子们祈祷,为所有安全受到威胁的人们祈祷。
In behavioral finance theory the investors in the security market are "Bounded rational People", whose irrational behaviors can, less or more, easily to cause behavioral deflections.
该理论认为证券市场中的投资者属于“有限理性人”,其行为或多或少地存在着非理性,因而容易出现行为偏差。
Meanwhile security procedure whose relevant norms allocates the losses arising out of fraud among the parties serves as the authentication means of payment order.
安全程序是支付命令的认证手段,其相关规则将欺诈损失在各当事方间进行了分担。
You may conduct security searches of qualified individuals with a disability whose aids activate the security system in the same manner as for other passengers.
对助动器具触发报警装置的符合乘机的残疾旅客,应该和对其他旅客一样进行同类检查。
On the base of these, a security database architecture whose secure level is not less than B1 is designed.
并在此基础上设计出了一种安全级别至少为B1的安全数据库体系结构。
应用推荐