这样做可以让应用程序能够访问强大、健壮且基于标准的安全性基础设施。
Doing so gives your applications access to a strong and robust standards-based security infrastructure.
数论中存在着许多难题,很多密码体制就是以这些难题为安全性基础的。
There are many intractable problems in number theory, many cryptosystems were established of which the security is based on the intractability of these problems.
一般情况下,权限类的方法由安全性基础结构使用,而不在应用程序中使用。
In general, the methods of permission classes are used by the security infrastructure and are not intended for use in applications.
易于管理:使得安全性基础设施的使用及其与应用程序的集成比较容易,以便于广泛采纳。
Ease of management: Making the security infrastructure's usage and integration with applications easy so that its adoption becomes widespread.
通过这种方式,您将能够利用厂商提供的强安全性基础设施,其中,业务要求需要支持复杂的授权规则。
This way you will be able to leverage the vendor-provided strong security infrastructure and, where business needs require, support more complex authorization rules.
客户对IBM软件的可配置性需求不断提升,以便能与其现有的IT和安全性基础设施中的其他第三方软件实现无缝连接。
Customers are increasingly demanding that IBM software be configurable to work seamlessly with other third-party software in their existing it and security infrastructures.
xml密钥管理规范(XML Key Management Specification,XKMS)使得安全性基础设施易于管理,而安全性断言标记语言(Security Assertion Markup Language,SAML)则使信任可以移植。
The XML Key management Specification (XKMS) allows for easy management of the security infrastructure, while the security Assertion Markup Language (SAML) makes trust portable.
这种方法通常精简高效,有利于提高性能,减少代码,改善安全性和可靠性(以tcb为基础)。
The approach tends to be thin and efficient, which provides a benefit to performance in addition to less code and improved security and reliability (on the basis of the TCB).
然而,作为负责提供基础功能的开发人员,您需要配置细粒度的安全性,并拥有对用户界面(UI)的完全控制。
As the developer responsible for providing this underlying functionality, however, you need to configure fine-grained security and have complete control over the user interface (UI).
在提供上面列出的那些东西时,您也指出了安全性实际上是基础架构问题。
In providing something along those lines, you're indicating that security is really an infrastructure issue.
这样做也不现实——gui库很大,而且依赖于庞大的基础结构,所以很难为了安全性而去分析所有的代码。
Nor would it make sense to try to do so — GUI libraries are huge and depend on large substructures, so it would be difficult to fully analyze all that code for their security properties.
利用WebSphereDataPowerSOA设备为支持服务虚拟化和安全性的ESB网关实现奠定了基础。
Utilizing the WebSphere DataPower SOA appliance lays the foundation for the ESB Gateway implementation with its support for service virtualization and security.
通过将Debian发行版作为基础,Ubuntu受益于Debian的安全性和性能。
By using the Debian distribution as a base, Ubuntu benefits from the security and performance aspects of Debian.
它是在PHP和MySQL等强大技术的基础上构建的,采用GPL许可协议,在AIX平台上使用可以显著增强安全性和性能。
It is also built upon strong technologies such as PHP and MySQL and licensed under GPL, which has much-improved security and enhanced performance on the AIX platform.
Rails的动态性让我们惊叹,它是在不需要严格的构造和类型安全性的编程语言(Ruby)的基础上构建的。
Rails is surprisingly dynamic and, therefore, was built on a programming language (Ruby) that does not require rigid constructs and type safety.
如果该链接受到威胁,则入侵者就可以断言任何身份并彻底破坏基础设施的安全性。
If that link is compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.
如果可以攻破该链路,入侵者就可以断言任何身份并彻底破坏基础设施的安全性。
If that link can be compromised, an intruder could then assert any identity and completely undermine the security of the infrastructure.
SSRM帮助处理SOA的安全需求,因为安全性适用于整个 SSRM——跨越基础设施、应用程序、业务服务和开发服务。
An SSRM helps address the security requirements of SOA, as security is applicable to the entire SSRM—across infrastructure, application, business services, and development services.
底层的基础设施也必须包括作为客户请求和服务器响应来回传递的有效负载的安全性和机密性。
The underlying infrastructure also includes the security and confidentiality that must cover the payloads that go back and forth as client requests and server responses.
本文中,我客观地定义了安全性及其基本技术,即XML规范化和PKI基础设施,在实现XML的安全交换中发挥着重要的作用。
In this article, I have objectively defined security and its basic technologies, namely XML canonicalization and the PKI infrastructure, which play an important role in making XML interchange secure.
DB 2提供安全性插件基础设施和一些缺省的安全性插件。
DB2 provides the security plug-in infrastructure and some default security plug-ins.
加强卫生系统(理想的做法是以初级卫生保健为基础),是达到卫生保健方面更高效率和公平性以及卫生部门内外更高安全性的可靠途径。
Strengthened health systems, ideally based on primary health care, are a reliable route to greater efficiency and fairness in health care and greater security in the health sector and beyond.
风险、培训和文化:执行风险评估和容纳计算机及网络基础结构的设施的物理安全性评估。
Risk, training, and culture: Conduct risk assessment and physical security of your facility that houses the computer and network infrastructure.
在典型的IT组织中还包括多个其他角色,包括基础设施支持、数据库支持、安全性等等。
There are several more roles in a typical it organization, including infrastructure support, database support, security, and so on.
分支esb的基础设施、转换、策略、安全性和服务注册中心项都是集中创建和管理的,很少或根本没有本地自定义。
The branch ESB infrastructure, transformations, policies, security, and service registry entries are all created and managed centrally with little or no local customization.
该项工作设计用于帮助实现美国陆军欧洲信息基础设施的无缝化,提高网络一体化和安全性。
The effort is designed to help streamline the Army’s European IT infrastructure and improve network integrity and security, company officials said.
技术模式——包括事务、安全性和其他基础结构元素。
Technical patterns - These encompass transactions, security, and other infrastructure elements.
即使最基础的扩展(如附件和安全性),也需要若干年进行开发,但仍然不受所有框架支持。
Even the most fundamental extensions, for features such as attachments and security, have taken several years to develop and are still not supported by all frameworks.
即使最基础的扩展(如附件和安全性),也需要若干年进行开发,但仍然不受所有框架支持。
Even the most fundamental extensions, for features such as attachments and security, have taken several years to develop and are still not supported by all frameworks.
应用推荐