• 完整性安全实现完整程度

    Completeness: How complete is the security implementation?

    youdao

  • 一个基于JAAS的安全实现

    A JAAS-based security implementation.

    youdao

  • 遵循soa安全实现的SDLC流程

    Follow an SDLC process for an SOA security implementation.

    youdao

  • 第7遵循soa安全实现SDLC流程

    Step 7. Follow an SDLC process for an SOA security implementation.

    youdao

  • 对于安全实现既有显式需求,也有隐式需求。

    For security implementations there are both explicit and implicit requirements.

    youdao

  • 所有这些标准都有自己一组特定需求,会总体soa安全实现造成影响

    All these standards generate their own set of specific requirements that affect the overall SOA security implementation.

    youdao

  • 安全QoS 定义了服务调用是否需要支持安全以及明确安全实现

    Security QoS specifies whether a service invocation supports security and the exact security implementation.

    youdao

  • 探讨采用B/S网络结构模式高校校园网MIS架构及其安全实现

    For network security consideration and by B/S mode application, a campus MIS system is proposed in this paper.

    youdao

  • 文章具体分析了WAP安全机制架构以及基于WAP安全架构安全实现方式。

    The article analyses the security mechanisms and structures, as well as the achievement of security based on the WAP security architecture.

    youdao

  • 应用程序管理的方法中,安全实现应用程序中实现的,必须实现相应安全调用。

    In the application-managed approach, security enforcement is done in the application, and the appropriate security callouts must be implemented.

    youdao

  • 许多安全实现进行基本假定与其进行交互用户一位真实用户(考虑到审核)。

    Many security implementations make the fundamental assumption that the user interacting with it is a real user (think about auditing, and so on).

    youdao

  • 给出了一个SET交易安全实现模型保证了交易的有效性机密性完整性不可抵赖性。

    Finally, it presents a secure implementation model of SET transaction, which ensures the validity, confidentiality, integrity and non-repudiation of transaction.

    youdao

  • 加密签名大多数企业安全实现基础回顾一下这些特性看看如何自己Web服务中应用它们

    Encryption and signing are the basis for most enterprise security implementations, so check back to see how you can apply these features in your own web services.

    youdao

  • 本文详细描述具体功能结构的设计实现包括网络数据存储方案和信息安全实现关键技术

    This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.

    youdao

  • COE具备开发soa安全参考体系架构安全标准、基于场景安全实现策略最佳实践内在能力

    The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.

    youdao

  • 为了让安全实现正确发挥作用servlet放到保护区域,以便只有通过认证审计员用户可以访问

    For the security implementation to function correctly, the servlet is put into the secured area that only authenticated auditors and users can access.

    youdao

  • gluecodeldap所附带登录模块能够针对LDAP服务器进行配置,以得到一个更为健壮安全实现

    Gluecode ships with a login module for LDAP that can be configured against LDAP servers for a more robust security implementation.

    youdao

  • 负责通过制定详细项目计划预算清楚地说明和反映soa安全实现必需东西确保每个人都对此心里有底。

    You're responsible for making sure that everyone "gets this" by creating detailed project plans and budgets that make clear and reflect exactly what an SOA security implementation entails.

    youdao

  • 相对于端的通信安全群组通信更为复杂基本算法系统安全协议安全实现都还存在需解决问题

    Secure group communication is more complicated than peer to peer communication, and poses a number of challenges ranging from basic algorithms, systems and secure protocols to secure implementation.

    youdao

  • 本文结合网格基本概念特点对网格安全进行分析,并结合网格安全基础设施GSI阐述了网格的安全实现

    The paper analyses Grid's security combining with its basic concept and characteristics and explains its implement with GSI.

    youdao

  • 终端用户的角度,本文针对嵌入式系统安全需求安全实现分别算法体系结构两个层次进行重点研究

    In this thesis, we attempt to research security requirements, physical security and implementations for embedded system from algorithm and architecture levels respectively from an end-user.

    youdao

  • 累加方式授予访问权限解释了为什么队列RACF安全实现允许单独授予getput 访问权限。

    The cumulative way that access is granted explains why the RACF implementation of security for queues does not allow get and put access to be granted independently.

    youdao

  • 基本的观念对于任意成功SOA安全实现而言,构造良好的HLD非常关键,SEA带领 SOA 安全团队进行创建工作负有最终责任

    The bottom line is that a well-constructed HLD is crucial for any successful SOA security implementation, and the SEA is ultimately responsible for leading the SOA security team toward its creation.

    youdao

  • 电源接口功率传输中,电源接头可以实现安全带电接。

    The power supply connector can realize safe electriferous insertion in the power transmission of a power interface.

    youdao

  • 大卫·瓦林格认为美国农业部应该采取什么行动实现粮食安全

    What should the USDA do to achieve food security according to David Wallinga?

    youdao

  • 卡什解释道:“专注安全可能会妨碍你实现目标。”

    "Focusing on being safe might get in the way of your reaching your goals," explains Kashdan.

    youdao

  • 这样的话,一个实现安全特性的绝佳地点

    As such, it is an excellent place to implement security features.

    youdao

  • 上文所述,消息安全实现依赖外部安全提供者

    As mentioned above, the message flow security implementation depends on an external security provider.

    youdao

  • 本文讨论使用相同网络安全机制实现多因素多层身份验证的风险

    This article discusses the risks associated with systems using the same network security mechanism for multifactor or multi-layer authentication.

    youdao

  • 使用安全代理实现超级集群路由需要考虑下面几个其他事项

    Here are some additional items to keep in mind when using a secure proxy to route across a super cluster.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定