• 一个ESB网关处理安全性策略

    An ESB gateway that handles security policies.

    youdao

  • 访问控制使系统能够识别用户安全性策略

    Access control. Enables the system to recognize security policies for groups of users.

    youdao

  • 组织安全性策略

    Organizational security policies.

    youdao

  • 日志记录跟踪消息交换以及安全性策略实施提供操作支持

    Operational support for logging, tracing message exchanges, and enforcement of security policy.

    youdao

  • 一个内容审计选项,用来决定安全性策略计算是否FM内完成

    A Content Audit option that determines whether security policy calculation should be done in FM.

    youdao

  • 作为分配风险等级一部分,必须考虑分配给数据安全性策略

    As part of assigning a risk level, you have to consider the security policies assigned to the data.

    youdao

  • 本文介绍了一些可以维持系统遵守安全性策略工具技术

    This article introduced some tools and techniques that can help you maintain your system's adherence to its security policy.

    youdao

  • 验证Web服务事务中的时,通常需要强制执行公司安全性策略

    Upon authentication of a party in a web services transaction, a company's security policy often needs to be enforced.

    youdao

  • 这个策略范围包括了隐私策略规则安全性策略和规则、交易实施规则。

    The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.

    youdao

  • 代码访问安全性策略配置状态分为三个管理策略级别企业计算机用户策略

    Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy.

    youdao

  • 如果用户特定成员可以给组分配一个角色,角色有权访问安全性策略允许资源

    When a user is a member of a specific group, then that group can be assigned to a role that is entitled to access resources for which the security policies allow.

    youdao

  • 对于给定应用程序宿主更改默认基于角色安全性策略设置默认安全主体

    For a given application domain, the host can change the default role-based security policy and set a default security principal.

    youdao

  • 用户必需充分定义所有安全性策略确保正常运行时间的可用性保证,而没有很少中断阈值

    You must adequately define all security policies to ensure uptime availability guarantees with little or no interruption thresholds.

    youdao

  • 虽然这种方法通信链路提供了适当安全性,但违反了图书销售商安全性策略

    Although this provides relevant security through the end-to-end communication link, the books-seller's security policy is violated.

    youdao

  • 客户机可以根据内容建立全面分级安全性策略而不是无论是否需要相同密钥强度加密所有内容。

    Instead of encrypting everything with the same key strength regardless of needs, rich clients can establish a comprehensive differentiating security policy based on the content.

    youdao

  • 要利用如此服务各种不同的业务背景下获得最大的商业效益必须谨慎考虑一个因素就是安全性策略管理

    Leveraging so many services for maximum business value across many different business contexts, one concept they must consider carefully is security policy management.

    youdao

  • 根据安装使用安全性策略可能创建一个用户名使用MicrosoftSQLServer

    Depending on the security policies that your installation USES, you might want to create a new username for Microsoft SQL Server use.

    youdao

  • 这些角色用于一些安全性策略比如针对IBMCognos8门户中的每个对象访问权限

    These groups and roles can be used in Security policies such as access permission for each object within the IBM Cognos 8 portal.

    youdao

  • 可以手动编辑策略文件可以使用代码访问安全性策略工具管理企业级别计算机级别用户级别安全策略

    You can edit policy files by hand or you can use the Code Access Security Policy tool to administer security policy for the enterprise, machine, or user levels.

    youdao

  • 除了这些基本配置问题之外。CXFWSDL 中支持外部策略引用对于那些跨平台标准化安全性策略组织,这是一个重要特性

    Beyond the basic configuration issues, CXF also supports external policy references in WSDL, an important feature for organizations that want to standardize security policies across the enterprise.

    youdao

  • 最后,本文就一般系统都非常关心的安全和性能两方面进行深入的探讨,提出了安全性策略组件负载平衡策略解决这两方面的问题。

    Lastly, the security and performance which often be cared about are deeply discussed, and security policy and Component Load Balance policy are given as solutions.

    youdao

  • 我们预期供应商将会互相牵制,试图证明谁拥有更强壮安全性隐私策略因为他们知道这些因素游戏规则的破坏者

    We can also expect that vendors will trip over each other trying to prove which one has the stronger security and privacy policies, because they know those factors are game-breakers.

    youdao

  • 尽管某些安全性测试方面可以建模策略,但并非所有都可以这样处理。

    Though certain aspects of security and testability can be modeled as policies, not all can.

    youdao

  • 分支esb基础设施转换策略安全性服务注册中心集中创建管理的,很少根本没有本地自定义

    The branch ESB infrastructure, transformations, policies, security, and service registry entries are all created and managed centrally with little or no local customization.

    youdao

  • 业务策略同一个时间跨越所有作用范围安全性、业务过程总体架构操作策略

    Where the business policy spans subject areas like security, business process, overall architecture and operational policies all at the same time.

    youdao

  • 有时候策略SOA 活动安全性可测试性会产生混淆

    Sometimes policy is confused with security and testability of an SOA initiative.

    youdao

  • 分支esb基础设施集中提供的,集中提供的还有转换策略安全性服务注册中心

    The branch ESB infrastructure is provided centrally, as are transformations, policies, security, and service registry entries.

    youdao

  • 管理插件提供安全性策略强制执行广泛的日志记录能力

    Management plug-ins provide security, policy enforcement, and extensive logging capabilities.

    youdao

  • 管理插件提供安全性策略强制执行广泛的日志记录能力

    Management plug-ins provide security, policy enforcement, and extensive logging capabilities.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定