• Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.

    这个数据库中的每个条目包含安全漏洞简要说明相关参考资料

    youdao

  • The standard J2EE security model contains a description of roles, which encompasses the security-constrained resources that can be accessed by principals.

    标准J2EE安全模型包含角色描述包括主体访问的受安全机制约束的资源

    youdao

  • Answer: the Version 5 Tech Preview does not express security requirements in the Web Services Description Language (WSDL) files.

    版本5技术预览并不Web服务描述语言(Web Services Description Language,WSDL)文件表达安全性需求

    youdao

  • You are discussing some of the aspects of security in the Synapse description, including WS-Security implementation.

    描述Synapse时,讨论了安全某些方面包括WS - Security实现

    youdao

  • These provide the underlying messaging, description, and discovery framework basic to all web services and the message-level security characteristics necessary for many B2B integration scenarios.

    这些规范提供基础消息传递说明发现框架,用于所有Web服务很多B2B集成场景必须的消息安全特征

    youdao

  • Configuring a security realm involves configuring three GBeans (see Resources for a link to a description of GBeans) : one for login module, one for login module usage, and one for the realm itself.

    配置安全领域需要配置三个GBeans(参阅参考资料以链接GBeans说明):用于登录模块,一个用于登录模块使用,一个用于领域本身

    youdao

  • In the security Roles section, add one security role with the name All role and the description All Authenticated users in the enterprise.

    SecurityRoles区段中添加一个名为allRole安全角色描述为AllAuthenticatedusersintheenterprise

    youdao

  • In computer security, a description of the characteristics of an entity to which access is controlled.

    计算机安全学中,一种存取受到控制实体特征描述

    youdao

  • This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.

    本文提出面向消息中间件的分布式认证协议给出协议内容形式化描述以及安全性分析。

    youdao

  • The practical mathematic description of dynamic security region makes it easy to take account of the uncertainties of power injections and motor loads proportion.

    安全数学描述使注入功率确定性电动机负荷比例不确定性的计及变得简便。

    youdao

  • This paper gives the formal description of the two-party protocol, and discusses the security, authenticability and verifiability for two-praty protocols.

    论文首先给出协议形式化描述然后讨论了协议安全性、可鉴别性可验证性。

    youdao

  • Considering the data flow description in protocol security testing, mutation analysis is introduced based on constructed type algebra, and a new protocol security testing method is proposed.

    针对协议安全测试数据描述问题,在构造类别代数基础引入变异分析,由此提出了种协议安全测试方法

    youdao

  • This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.

    本文详细描述具体功能结构的设计实现,包括网络数据存储方案信息安全实现关键技术

    youdao

  • A security policy for multilevel security, RDBMS, is proposed together with a detailed description of the discretionary security, multilevel security and the principle of least privilege.

    提出多级安全rdbms一种安全策略,对策略中的自主安全、多级安全和最小特权原则进行了详细叙述

    youdao

  • The research on environment security mainly rested on the stage of qualitative description on environment security or quantitative assessment of natural eco - environment security.

    环境安全研究目前主要停留定性描述定量评价自然生态安全阶段

    youdao

  • Therefore, accurate description and calculation of the tower crane's dynamic process under outside inspiration play a very important role in tower crane's economy and security.

    因此准确描述精确计算塔机结构体系在外激励动态过程,对于塔机的经济性安全性具有非常重要意义

    youdao

  • Tool Description: GS-DES map document security system, the client is not installed, you can not see the encrypted files.

    工具说明GS - DES文档安全系统中,没有安装了客户端后,无法查看加密的文件。

    youdao

  • At the same time, some key problems, such as human computer interface, product engineering data modeling and description and security of the distributed system, are analyzed and described.

    同时也对人机接口产品工程数据建模以及分布式安全协同设计中关键问题解决进行了分析说明。

    youdao

  • Follow these steps, this article will analyse the IPTV service security from three aspects: threats description, security requirements analysing, and IPTV service security architecture.

    本文按照以上步骤威胁描述安全需求分析、安全架构模型几个方面对IPTV业务的安全问题进行分析梳理。

    youdao

  • It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.

    统一描述策略元素安全规则支持多种访问控制模型体现良好通用性

    youdao

  • Policy description language, which is one of the core parts of the policy-based security management system, is still lack of a common standard.

    作为基于策略安全管理系统核心之一安全策略描述语言至今没有一种业界通用标准

    youdao

  • Description of the procedures for the security thread.

    线程安全实例。程序说明线程安全问题。

    youdao

  • In computer security, a description of the type of authorized interactions a subject can have with an object. Permissions include: read, write, execute, add, modify and delete.

    计算机安全学主体一个客体合法作用类型,包括执行添加修改删除

    youdao

  • It's probably not in the job description of the security personnel to chase the wally wasting energy!

    负责巡逻保安员大概祇管贼而不会理会有谁浪费能源吧。

    youdao

  • Job description:1, Office daily management: management, maintenance company security, cleaning, instrument equipment and resources, to ensure that the company's daily operation;

    岗位职责1办公室日常管理:管理、维护公司安保清洁仪器设备资源保证公司日常运作

    youdao

  • Job description:1, Office daily management: management, maintenance company security, cleaning, instrument equipment and resources, to ensure that the company's daily operation;

    岗位职责1办公室日常管理:管理、维护公司安保清洁仪器设备资源保证公司日常运作

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定