如上文所述,消息流安全性实现依赖于外部安全性提供者。
As mentioned above, the message flow security implementation depends on an external security provider.
分析了当前采空区场流安全理论研究的最新进展和发展趋势。
The current progress and development trend in the study of safety theory of field flow in goaf are analyzed.
基于人类的社会智能特征,提出了一种网络信息流安全环模型。
This paper puts forward a security-ring model for network information flow based on human social intelligence.
您将测试两个场景:一个使用从HTTP报头中提取的身份测试消息流安全性功能。
You are going to test two scenarios: one for testing message flow security functions using the identity extracted from the HTTP header.
补货管理对连锁超市的日常销售、营销、顾客满意度、供应商满意度、现金流安全都有十分重要影响。
Replenishment management plays a very important role in daily sales, marketing, and customer satisfaction as well as cash flow safety.
继承类内的信息流安全特性可以使用传统的信息流研究方法,继承类间的信息流安全特性则使用基于流的概念进行研究。
We consider research for the security properties of information flow of active network as properties of the inheriting class inner flow and flow among different inheriting classes.
如果没有启用这种消息流安全性,WebSphereBroker中的默认安全性工具将基于传输机制所提供的安全性。
Without enablement of this message flow security, the default security facilities in WebSphere message Broker are based on the security provided by the transport mechanism.
要配置消息流安全性,需要使用外部安全性提供者来强制实施安全性,例如TivoliDirectoryServer。
To configure the message flow security, an external security provider is required, such as Tivoli Directory Server, to be used as the security enforcement.
不过,如果您知道当信号可能到达时,程序不可能使用处理器那个时刻所使用的流,那么就是安全的。
However, if you know that the program cannot possibly use the stream that the handler USES at a time when signals can arrive, you are safe.
当前所用的DSL将会变得更加强大,当然复杂性也会不断攀升,它会整合安全、验证及应用流。
The DSL's that are currently in use will continue to become more powerful and sophisticated, incorporating security, validation, and application flow.
各个中介模式被适当地放在中介流中以实现预期的交互目标,以及执行管理和安全策略。
Individual mediation patterns are placed appropriately in the mediation flow to achieve the goals of the intended interaction as well as to enforce management and security policies.
受此影响的用例是RESTfulURL、书签支持、通过URL模式获得的安全性以及页面流验证等。
Use cases affected by this trade-off are RESTful URLs, bookmarking support, security through URL patterns, and page-flow validation, to mention a few.
然后本文将介绍如何在MessageBroker消息流中使用这些节点,包括缓存策略和安全注意事项。
The article then shows you how to use these nodes within message Broker message flows, including caching strategy and security considerations.
对于Web应用程序,安全静态分析最重要的类型叫做污染流分析。
For Web applications, the most important type of security static analysis is called taint flow analysis.
Datapower设备是一个硬件设备,旨在提供以下功能:xml转换、用于调用企业服务的安全访问通道和基本的中介流功能。
The Datapower appliance is a hardware appliance designed to provide: XML transformation, a secure access channel to invoke enterprise services, and basic mediation flow capabilities.
安全性配置文件中定义的安全性功能是在消息流的输入和输出/请求节点上执行的。
The security functions defined in a security profile are performed on input and output/request nodes of a message flow.
从安全性的角度来看,必须跨所有功能(比如工作流、关系和层次结构管理)实现属性级的特权授权粒度。
From a security perspective, attribute-level granularity of authorization privileges across all functions such as workflow, relationship and hierarchy management must be available for implementation.
您还应该了解现有的各种企业组件,如安全机制、业务流程和业务规则引擎、工作流引擎和打包的应用程序。
You should also be aware of existing enterprise components, such as security mechanisms, business process and business rules engines, workflow engines, and packaged applications.
基本服务可以与支持工作流、安全性和审计日志记录的通用企业组件集成。
Base services can be implemented to integrate with common enterprise components that support workflow, security, and audit logging.
如果希望实现安全的特殊版本控制工作流,让两个开发人员可以在咖啡馆中通过无线网络一起工作,那么可以试试下面的方法。
If you want to enable a secure, ad-hoc version control workflow, for instance, two guys on a wireless network in a coffee shop, then try out this hack.
其他中介模式提供了对安全和管理策略定义点的直接或间接访问,以便中介流能够执行适当的控制。
Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.
在部署过程中,将检查消息流中使用的安全性配置文件是否存在。
During the deployment process, the existence of the security profiles used in the message flows is checked.
您可以在消息流级设置安全性配置文件属性,以便在节点安全性配置文件的属性留空时,节点能够继承这些属性。
You can set the security profile property at the message flow level, so that a node can inherit it if the node security profile property is left blank.
这是一个安全性漏洞,因为入侵者可能可以伪装成消息传递引擎并截获总线通信流。
This is a security hole because an intruder could potentially pretend to be a messaging engine and compromise the bus traffic.
分配给用户的角色可以用在定制安全策略的设计和实现中,以及定制的工作流和事件升级流中。
Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.
下图中的协议栈之间的黑线流向代表安全上下文的流而不是信息流。
The black lines flowing between the stacks in the figures below represent flow of security context not information flow.
这样的内容包括音频或视频的实时转播流、安全帐户信息或事务的链接和大型数据流。
Examples of such content include live audio or video broadcast streams, links to secure account information or transactions, and large data streams.
除了工作流支持外,本文没有涉及到的另一个重要问题是安全性。
Aside from workflow support, another important issue I didn't consider in this article is security.
XML数据所带来的透明性要求应用程序的处理工作流的透明性也相应增加,从而减少从安全性到状态控制方面的问题。
The increased transparency of XML data requires an increased transparency of application processing workflow in order to mitigate problems from security to state control.
处理复杂数据流的难度导致了第三条准则的出现:围绕XML处理管道来设计应用程序,从而让数据流更容易进入安全威胁评估。
The difficulty of dealing with intricate data flow leads to the third principle: Design your applications around XML processing pipelines to make data flow easier to factor into threat assessment.
应用推荐