一个基于JAAS的安全实现。
遵循soa安全实现的SDLC流程。
对于安全实现,既有显式需求,也有隐式需求。
For security implementations there are both explicit and implicit requirements.
所有这些标准都有自己的一组特定需求,会对总体soa安全实现造成影响。
All these standards generate their own set of specific requirements that affect the overall SOA security implementation.
安全QoS 定义了服务调用是否需要支持安全以及明确的安全实现。
Security QoS specifies whether a service invocation supports security and the exact security implementation.
探讨了采用B/S网络结构模式的高校校园网MIS架构及其安全实现。
For network security consideration and by B/S mode application, a campus MIS system is proposed in this paper.
文章具体分析了WAP的安全机制及架构以及基于WAP安全架构的安全实现方式。
The article analyses the security mechanisms and structures, as well as the achievement of security based on the WAP security architecture.
在由应用程序管理的方法中,安全实现是在应用程序中实现的,必须实现相应的安全调用。
In the application-managed approach, security enforcement is done in the application, and the appropriate security callouts must be implemented.
许多安全实现都进行一个基本假定,即与其进行交互的用户是一位真实用户(考虑到审核等)。
Many security implementations make the fundamental assumption that the user interacting with it is a real user (think about auditing, and so on).
给出了一个SET交易的安全实现模型,它保证了交易的有效性、机密性、完整性和不可抵赖性。
Finally, it presents a secure implementation model of SET transaction, which ensures the validity, confidentiality, integrity and non-repudiation of transaction.
加密和签名是大多数企业安全实现的基础,回顾一下这些特性,看看如何在您自己的Web服务中应用它们。
Encryption and signing are the basis for most enterprise security implementations, so check back to see how you can apply these features in your own web services.
本文详细描述了其具体功能结构的设计和实现,包括网络数据存储方案和信息安全实现等关键技术。
This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.
COE具备开发soa安全参考体系架构、安全标准、基于场景的安全实现策略和最佳实践的内在能力。
The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.
为了让安全实现正确发挥作用,servlet被放到受保护区域,以便只有通过认证的审计员和用户可以访问。
For the security implementation to function correctly, the servlet is put into the secured area that only authenticated auditors and users can access.
gluecode为ldap所附带的登录模块,能够针对LDAP服务器进行配置,以得到一个更为健壮的安全实现。
Gluecode ships with a login module for LDAP that can be configured against LDAP servers for a more robust security implementation.
您将负责通过制定详细的项目计划和预算,清楚地说明和反映soa安全实现所必需的东西,确保每个人都对此心里有底。
You're responsible for making sure that everyone "gets this" by creating detailed project plans and budgets that make clear and reflect exactly what an SOA security implementation entails.
相对于端到端的通信,安全群组通信更为复杂,从基本算法、系统及安全协议到安全实现都还存在需解决的问题。
Secure group communication is more complicated than peer to peer communication, and poses a number of challenges ranging from basic algorithms, systems and secure protocols to secure implementation.
本文结合网格基本概念和特点对网格的安全性进行分析,并结合网格安全基础设施GSI阐述了网格的安全实现。
The paper analyses Grid's security combining with its basic concept and characteristics and explains its implement with GSI.
从终端用户的角度,本文针对嵌入式系统的安全需求、安全实现分别从算法级和体系结构级两个层次进行重点研究。
In this thesis, we attempt to research security requirements, physical security and implementations for embedded system from algorithm and architecture levels respectively from an end-user.
以累加的方式授予访问权限解释了为什么队列的RACF安全实现不允许单独授予get和put 访问权限。
The cumulative way that access is granted explains why the RACF implementation of security for queues does not allow get and put access to be granted independently.
最基本的观念是,对于任意成功的SOA安全实现而言,构造良好的HLD非常关键,SEA对带领 SOA 安全团队进行其创建工作负有最终的责任。
The bottom line is that a well-constructed HLD is crucial for any successful SOA security implementation, and the SEA is ultimately responsible for leading the SOA security team toward its creation.
在电源接口的功率传输中,电源接头可以实现安全带电插接。
The power supply connector can realize safe electriferous insertion in the power transmission of a power interface.
大卫·瓦林格认为美国农业部应该采取什么行动来实现粮食安全?
What should the USDA do to achieve food security according to David Wallinga?
卡什丹解释道:“专注于安全可能会妨碍你实现目标。”
"Focusing on being safe might get in the way of your reaching your goals," explains Kashdan.
这些安全标准将用于构造整个SOA实现中的安全消息。
These security standards will be used to construct secure messages throughout an SOA implementation.
如上文所述,消息流安全性实现依赖于外部安全性提供者。
As mentioned above, the message flow security implementation depends on an external security provider.
本文讨论使用相同的网络安全机制实现多因素或多层身份验证的风险。
This article discusses the risks associated with systems using the same network security mechanism for multifactor or multi-layer authentication.
设计和实现安全的分布式基础设施并不容易。
Designing and implementing a secure distributed infrastructure is not easy.
在使用安全代理实现跨超级集群路由时,需要考虑下面几个其他事项。
Here are some additional items to keep in mind when using a secure proxy to route across a super cluster.
在使用安全代理实现跨超级集群路由时,需要考虑下面几个其他事项。
Here are some additional items to keep in mind when using a secure proxy to route across a super cluster.
应用推荐