For example, is there a need to propagate client identity through intermediate systems such as brokers to the end-providers of service implementations?
例如,是否有必要通过类似于代理的中间件系统来把客户端身份传递到服务实现的最终提供者?
The patient is still at the center, but as an icon for another identity clothed in binary garments that I call the I-Patient.
“患者仍然是治疗中心,但是患者作为一种符号,他为另一重身份,穿上双重外衣,我称之为——我-患者”。
As described above, it is important for security against repudiation to add both a nonce and the identity of the intended recipient to application data to be signed.
正如上面所描述的那样,对于针对抵赖的安全性来说,在待签名的应用数据中同时加入现时标志和目标接收方的身份是非常重要的。
Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
What better suggestion is there for what we could point to as the metaphysical glue,? The key to personal identity?
还有什么更好的东西,我们可以用来,作为形而上粘质,作为人格同一性的关键?
Yet nowhere has the dream of a house and a sun-drenched garden been so central to a city's identity for so long as in Los Angeles. So nowhere does the change come as such a shock.
没有一个地方能像洛杉矶一样把花园“阳”房作为城市身份的主要特征,因此,上述变化给洛城带来的震动也比其他地方大。
Although some debate still remains as to the true identity of the Devil-Bird, the spot-bellied eagle owl stands as the most compelling source of inspiration for this mysterious creature.
尽管有人仍然在争论恶魔鸟的真实身份,但是林雕鸮是最符合传说中的动物的现实原型。
WebSphere Application Server V5 provides support for username token, X509, identity assertion, signatures and encryption as "technical previews", meaning that they are not supported.
WebSphereApplicationServerV5提供了对用户名令牌、X509、身份断言、签名和加密的支持作为“技术预览”,这表示它们还没有得到正式支持。
The notion of identity can prove to be a sticky subject, as the traditional Web is primarily built for anonymous access.
身份的概念可能会成为一个棘手的主题,传统Web主要是为匿名访问而构建的。
Mr Lanstein said hard drives from the servers had been handed over to a forensic firm that will scour them for clues as to the identity of the network's controllers.
Lanstein先生称服务器上的硬盘已经交给法庭,来搜寻可以查明僵尸网络控制者身份的线索。
You will adjust your JPA entities to have the ID attributes specified as ones that will have unique values generated for them by your database, using the Identity Generation scheme.
您要调整您的JPA实体,使用IdentityGeneration方案以将ID属性指定为数据库所生成的独特值。
Remember to assign the correct value to the static label using Identity Windows in the same manner as you assigned the PNG file for the backgroung image of OneView.
记住要采用与分配PNG文件作为OneView背景图像的相同方式使用Identity窗口将正确的值分配给静态标签。
Groeb says he has urged FDA to take action as he also "totally supports a standard of Identity for honey."
Groeb说他已经督促FDA采取措施,因为他也“绝对支持鉴定蜂蜜的标准。”
As for Rafe, having a father old enough to be his grandfather must also create problems of identity.
尽管对我来说,人们都叫我Attenborough先生,而不是JohnSimpson,但是对Rafe来说,有一位老得足以当其祖父的父亲,总是会造成身份的识别问题。
And yet for all that dualists could consistently say, still same soul as not the key to personal identity, same personality is the key to personal identity.
所有的二元论者都可以坚持认为,同样的灵魂并非,人格同一性的关键,同样的人格,才是人格同一性的关键。
No matter what he ends up as in real life, I want him to have a secret identity that always fights for justice.
不论他在现实生活中是什么人,我愿他有一个总是为正义而战的秘密身份。
The demand, really, is for a celebratory history: how otherwise could it serve as the cement of national identity?
这样的要求实际上是在呼唤一种满是庆祝的历史:否则它如何能成为民族认同感的基石?
In the customer case, for instance, this data contains relatively static attributes of customers, such as attributes on the identity, detailed profile, and relationships among customers.
例如,对于客户,主数据包括客户的静态属性(比如身份属性)、详细的个人信息以及客户之间的关系。
For example, by default the contents of your buddy list are stored on the server as a backup, in case you forget the identity of your buddies.
比如,默认情况下,好友列表的内容以备份形式存储在服务器中,以防您忘记好友的身份。
In this particular sample, the asserted identity for the server side is simply sent as a method parameter of the remote invocation.
在这个特定的示例中,服务器端的断言标识作为远程调用的方法参数发送。
This is a service that I personally use as the final catch all for negative changes to my credit report (including identity theft).
这是我个人在信用报告出现消极变化(包括身份被盗用)时使用的服务。
They have linked clients to social services, helped obtain identity documents for marginalized groups, and promoted savings as a medium-term strategy to help CCT households out of poverty.
这些技术将客户和社会服务连成一体,帮助边缘化群体获得了身份证明文件,促进了储蓄并使之成为帮助受援家庭摆脱贫困的一种中期手段。
The actual identity used for assertion is defined in the WEB application as an environment variable: WEB_USER2, with the value of user2.
断言所使用的实际标识在WEB应用程序中定义为一个环境变量:WEB_USER2,其值为user2。
As long as users choose passwords that are sufficiently difficult for others to guess, the combination of a user name and password is usually enough to establish identity.
只要用户选择了他人很难猜到的密码,那么用户名和密码的组合通常就足以确立身份。
The actual identity used for assertion is defined in the sending server's WEB application as an environment variable, WEB_USER2, with the value of user2.
断言所使用的实际标识在发送服务器WEB应用程序定义为环境变量WEB_USER2,其值为user2。
As our group membership forms our identity, it is only natural for us to want to be part of groups that are both high status and have a positive image.
鉴于这种说法,我们希望成为地位高、形象良好的群体中的一员就再正常不过了。
They are increasingly worried about being targeted for their wealth and fear crimes such as identity fraud, carjacking and stalking.
他们越来越担心自己由于钜额身家而成为不法之徒的攻击对象,同时也害怕在自己家附近发生诈骗、车祸和被人跟踪等事件。
They are increasingly worried about being targeted for their wealth and fear crimes such as identity fraud, carjacking and stalking.
他们越来越担心自己由于钜额身家而成为不法之徒的攻击对象,同时也害怕在自己家附近发生诈骗、车祸和被人跟踪等事件。
应用推荐