If random numbers are messed up, all security based on it is suspicious.
如果随机数搞乱了,那么基于它之上的所有安全都是可疑的。
Bad security based on direct communication?
基于直接通信不安全?
Security is controlled based on the user's identity.
基于用户身份来控制安全性。
DB2 further extends security by offering a Label Based Access Control (LBAC) mechanism.
DB 2提供了基于标签的访问控制(Label Based Access Control,LBAC)机制,从而进一步扩展了安全性。
Policy based service security management.
基于策略的服务安全性管理。
The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
Such views are based on a history of security cooperation.
这样的观点是基于双方安全合作历史之上的。
We'll discuss domain-based mobile code security in more detail in a later section.
在后面的一节中,我们将更详细地讨论基于域的移动代码安全性。
Setting up role-based security is easier than most people think.
设置基于角色的安全性比大部分人所想的更轻松。
You now know how to enforce both URL-based security and method-based security.
您现在掌握了如何加强基于URL的安全性和基于方法的安全性。
Information security in general and authentication in particular are key aspects for any IT-based solution.
信息(尤其是身份验证信息)的安全性是任何基于IT的解决方案的关键方面。
What are the security risks in an SAML-based system?
基于SAML的系统的安全风险是什么?
Based on our systemic model of information security, we design an electronic seal system.
基于我们提出的信息安全模型,设计了电子印章系统。
Custom build a security service based on jaas.
构建基于JAAS的自定义安全服务。
The prevention principle for security must be based on the deep security culture.
安全的预防原则必须建立在深厚的安全文化基础上。
Note: You need gssapiDB2.h only if you are implementing the GSS-API-based security plug-in.
注意:只有在实现基于 GSS-API 的安全性插件时才需要gssapiDB2.h。
Secure group communication is based on a consistent security policy.
安全组通信的前提是一致的安全策略。
This environment, I believe, is based upon the necessity for security and friendship.
营造这个环境,我相信,是以安全和友谊为必要前提的。
Login screen provides custom authentication and password reset based on security question and answer.
登录屏幕提供自定义身份验证和密码重置安全问题和答案。
Code access security is a stack-based algorithm.
代码访问安全是一个基于堆栈的算法。
Based on this, validated the coal mine security factor analysis evaluation pattern.
在此基础上,对煤矿安全因子分析评价模式进行了应用验证。
This model based on the multilevel security policy, to increase host security in every aspects.
模型以多级安全策略为基础,以全面增强主机安全。
The system adopts the Role Based Access Control to ensure the security of the system.
系统采用了基于角色的访问控制策略,进一步保证了系统的安全。
PKI is infrastructure provide security service, based on public key theory and technology.
PK I技术是利用公钥理论和技术建立的提供安全服务的基础设施。
The information system based on this model can provide high-level security service.
试验表明基于该模型的信息系统可提供高水平的安全服务。
The value of a derivative is based on another security.
金融衍生工具的价值以另一种债券为基准。
Honeypot technology is a new initiative based on the defense network security technology.
蜜罐技术是一种新兴的基于主动防御的网络安全技术。
Security program was based on calculated risk.
保安工作准备冒一定的风险。
Therefore, chaos-based encryption techniques play an increasing role in information security.
因此,基于混沌的密码技术在信息安全方面具有重要的地位。
Therefore, chaos-based encryption techniques play an increasing role in information security.
因此,基于混沌的密码技术在信息安全方面具有重要的地位。
应用推荐