Then, the importance of implementation security is discussed. Furthermore, we study how to apply cryptographic primitives to embedded security engineer.
进一步分析了嵌入式安全中密码算法的实现安全性,以及密码算法在嵌入式安全工程中的应用。
This view is useful for debugging purposes but should not be enabled in production, as it might compromise security by revealing implementation details.
该视图对于调试过程非常有用,但是不应在生产中启用,因为它披露了实现细节,可能会影响安全性。
As mentioned above, the message flow security implementation depends on an external security provider.
如上文所述,消息流安全性实现依赖于外部安全性提供者。
You're responsible for making sure that everyone "gets this" by creating detailed project plans and budgets that make clear and reflect exactly what an SOA security implementation entails.
您将负责通过制定详细的项目计划和预算,清楚地说明和反映soa安全实现所必需的东西,确保每个人都对此心里有底。
All these standards generate their own set of specific requirements that affect the overall SOA security implementation.
所有这些标准都有自己的一组特定需求,会对总体soa安全实现造成影响。
The main advantage of using the GSS-API is that by writing to this generic API, your implementation can interoperate with various security systems.
使用GSS - API的主要优点是,通过使用这种通用API编写代码,您的实现可以与不同的安全性系统互操作。
The services are managed for identity and compliance through proper service-level security design and implementation.
通过适当的服务水平安全性设计和实现对服务进行标识和遵从性管理。
Because of this review, it could address security issues before purchase and implementation, or they would block implementation as designed.
由于这些审核,IT能在购买或实施前涉及到安全问题,否则他们就会阻止按设计去实施。
Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.
分配给用户的角色可以用在定制安全策略的设计和实现中,以及定制的工作流和事件升级流中。
Centralizing the implementation of security policies, log analysis and reporting is a good thing.
安全策略、日志分析与报告的中心化实现是个不错的主义。
The report focuses on security program management, implementation and system administration of intelligence activities.
此报告主要针对安全计划管理以及情报活动的执行和系统管理。
The practical strategy for a security implementation is much more likely to be developed through a more prescriptive process.
安全政策执行的首要策略,更有可能是通过一个约定俗成的过程来开发的。
For example, these proprietary IOR components could encode the ORB type and version or help support an ORB implementation of the OMG Security Service.
例如,这些专用IOR组件可以编码OR b类型和版本,或者帮助支持OMG安全服务的OR B实现。
A review of security requirements and implementation is an important part of this stage of the assessment.
对安全需求和实现的检查是这一阶段评估的重要部分。
Stay tuned for the upcoming articles in this series, which will continue to explore warehouse ETL process design and implementation, warehouse performance, security, and more.
继续本系列中的下一篇文章,其中将继续探索仓库ETL过程的设计和实现、仓库性能、安全性等。
While you may want to rush implementation of your new SOA, don't take shortcuts to security.
在您可能希望匆忙实现新的SOA 时,请不要在安全方面走任何捷径。
The security constraints and conditions are attached to the implementation artifacts.
安全约束和条件是附加到实现构件的。
Active involvement in selecting technology standards, evaluating and selecting tools, macro and micro design, development, testing, implementation, reuse, and security aspects.
积极参与选择技术标准、评估和挑选工具、宏观和微观设计、开发、测试、实现、重用以及安全方面等等。
The metadata model is also tightly integrated with the definition and implementation of the event validation and security.
元数据模型还与事件检验和安全性的定义和实现紧密集成。
In the implementation process of SOA, security related problems occur every minute, every place on everybody.
在SOA的实现过程中,几乎每时每刻以及每一个位置都会发生与安全性有关的问题。
The bottom line is that a well-constructed HLD is crucial for any successful SOA security implementation, and the SEA is ultimately responsible for leading the SOA security team toward its creation.
最基本的观念是,对于任意成功的SOA安全实现而言,构造良好的HLD非常关键,SEA对带领 SOA 安全团队进行其创建工作负有最终的责任。
Authorization is achieved when the service implementation, session EJB, is called using the EJB security model.
当使用EJB安全模型调用服务实现、会话ejb时,将实现授权处理。
And, counter-intuitively, much of the SOA security services implementation must be understood simultaneously.
而且,必须同时了解SOA安全服务实现的大部分内容。
The COE has built-in competency in developing SOA security reference architectures, security standards, scenario-based security implementation strategies, and best practices.
COE具备开发soa安全参考体系架构、安全标准、基于场景的安全实现策略和最佳实践的内在能力。
The conceptual nature of SOA leaves the networking, transport protocol, and security details to the specific implementation.
从概念上来说,SOA本质上是将网络、传输协议、安全细节留给特定的实现来处理。
The implementation of a customized security plug-in is left to your discretion.
定制的安全性插件的实现则有待您来决定。
Follow an SDLC process for an SOA security implementation.
遵循soa安全实现的SDLC流程。
As far as the average program is concerned, the details of the security implementation don't matter very much.
就一般程序来说,安全性实现的细节并不重要。
The HLD must serve to communicate clearly what they have in mind in terms of providing overall security for the SOA implementation.
HLD必须清楚地从SOA实现的总体安全性的角度说明其设想。
Users of NFS may now conduct secure transactions using a remote procedure call (RPC) implementation of the General Security Service (GSS) API.
使用通用安全服务 (General Security Service,GSS)API的远程过程调用 (remote procedure call,RPC)实现,NFS的用户现在可以进行安全的事务处理。
应用推荐