End-to-end security must be enabled to use this feature.
必须启用全程安全性才能够使用此特性。
The need for an end-to-end security solution is on the horizon.
于是就出现了对端到端安全性解决方案的需求。
To provide end-to-end security, we need to secure XML documents.
为了提供端到端安全性,我们需要确保XML文档的安全。
When securing digital information, it is important to implement end-to-end security.
在保护数字信息时,实现全程安全性是很重要的。
The end to end security model would mean that all providers give access to all trusted requesting applications.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
XML encryption provides end-to-end security for applications that require secure exchange of structured data.
XML加密为结构数据的安全交换提供了端到端的加密。
In order for the human task administration functions to work properly, you must have end-to-end security enabled.
为了让人工任务管理功能正常工作,必须启用全程安全性。
Finally, Research on safety communication, we propose a safety-invoking mechanism, ensuring end-to-end security.
第四,开展了安全通信的研究。提供了安全调用服务的机制,保证端到端的安全。
Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.
基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议。
Meanwhile, security is another issue for IP-Enabled sensor network. End to end security is a problem for open network architecture.
于此同时,网络安全也是IP传感器网络面临的问题之一,开放式的网络体系,将会产生端到端的安全问题。
Without a WAP gateway in the middle, smart applications can provide scalable end-to-end security from the back end to wireless devices.
由于中间没有WAP网关,智能应用程序可以提供从后端到无线设备的可伸缩的端对端安全性。
To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.
为了解决这些问题,我们需要一种具有灵活加密方案的端对端安全性模型以满足一系列不同的需求。
This incorporates many elements, including consumer, enterprise, femtocells, transcoding, end-to-end security, home gateways, and mobile broadband-enabled services.
这合并了许多元素,包括使用者、企业、家庭基站、转码、端到端安全性、家庭网关和启用移动宽带的服务。
This architecture USES WS-Security to provide end-to-end security and possibly non-repudiation (if the service persists the inbound message before removing security).
此体系结构使用WS - Security来提供端到端安全和可能的不可否认性(如果服务在删除安全前保存入站消息)。
Both solutions provide message-level security, incorporating security features in the SOAP message and working in the application layer, thus ensuring end-to-end security.
这两个解决方案都提供了消息级别的安全性,将安全功能合并到SOAP消息中并作用于应用层,因此保证了端到端的安全。
Iraqi lawmakers are expected to vote on a security agreement by Wednesday, which will keep the US troops here until the end of 2011, the parliament's speaker said yesterday.
议会发言人昨日表示,伊拉克立法者预计将在周三之前就一项安全协议进行投票,该协议将使美军在伊拉克驻扎至2011年底。
End user identities are not used in security enforcement but may be included in data for audit.
安全执行中不使用最终用户标识,但可能包括在数据中用于进行审核。
By making long-delayed fuel shipments to Bushehr now, Russia will weaken further the UN Security Council effort to end Iran's defiance.
如今俄罗斯将拖延已久的燃料运抵了布什尔,这将进一步削弱联合国安理会结束伊朗挑衅的努力。
Does this mean that a rising China is destined to end up in an intense security competition, maybe even a war, with its neighbors and the United States?
这是否意味着一个崛起的中国必然要同其邻国和美国陷入一场激烈的安全竞赛,直至最终以兵戎相间来收场?
An end user should evaluate a service provider's security policy before entering into a relationship.
在使用服务之前,最终用户应该评估服务提供商的安全策略。
Partly because they're the target of often more advanced security attacks, they're the sharp end of the stick.
部分原因是由于他们更容易成为高级安全性攻击的靶子。正所谓枪打出头鸟。
Women are absent from negotiations about peace and security to end those conflicts.
在为结束这些冲突而举行的有关和平与安全问题的各种协商中,没有妇女参加。
But it could leave the Security Council split and make an end to the stand-off with Iran harder.
但是,这份协议已经使安理会意见分歧,而且要与伊朗结束僵局更加困难。
The official line is that we use Linux as a means to an end; STD is about security tools and not Linux, although we are all avid Linux fans.
实际的情况是我们使用Linux作为实现最终目的的一种手段;std是关于安全性工具的一套方案,而不是一个Linux,尽管我们有很多Linux的爱好者。
Some security crackers end up using their powers for good, providing penetration testing services or otherwise making efforts on the side of the angels.
一些安全破解者最终会将其能力用到好的方面,比如提供渗透测试服务,或者是其他一些站在天使这边的所为。
The advantage of client virtualization is that it provides higher data security, easier manageability, decreases end-user downtime, and ensures business continuity.
客户机虚拟化的优点是,提供更高的数据安全性,更容易管理,减少最终用户的停机时间,确保业务连续性。
The advantage of client virtualization is that it provides higher data security, easier manageability, decreases end-user downtime, and ensures business continuity.
客户机虚拟化的优点是,提供更高的数据安全性,更容易管理,减少最终用户的停机时间,确保业务连续性。
应用推荐