Containing all the key security relationships between objects.
包含对象间所有的关键安全关系。
This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
此特性让这三种关键的安全技术能够利用 ACF提供的硬件密码计算加速设施。
This paper discusses key security technologies for a smart grid system, including public key infrastructures and trusted computing.
本文讨论了一个智能电网系统的关键安全技术问题,包括公钥基础设施和可信计算。
The method can solve the question of the secret key security in larger system and provide a valuable guarantee system of information security.
该方法能够解决较大系统中密钥安全性的问题,提供了一个安全可行的信息安全保障体系。
In modern cryptography, it is believed that any algorithm of encryption and decryption in cryptographical systems can be open, their safety depends on key security.
现代密码学认为,任何加密体系的加密和解密算法都可以公开,其安全性在于密钥的安全性。
I have highlighted a few of the key security features in Firefox 3, but not all of them. In addition to the features and functions I have already covered, Firefox 3 also provides.
我标明了Firefox3的关键但不是全部的安全功能。
Commodore Leavy: the ANZUS Treaty is the key security agreement between Australia and the United States and allows both our countries to assist each other in times of conflict.
利维准将:澳新美安全条约是澳大利亚与美国之间的一项主要安全协定,让我们两国能互相帮助、共同应对冲突。
Before delving into SSL itself, it is useful to consider the key security problems that network communication faces, along with the appropriate solutions. Key security problems include.
在深入研究ssl本身之前,考虑一下网络通信面临的关键的安全性问题以及适当的解决方案,这是很有帮助的。
Many key security technologies are involved, such as ID authentication, digital signature and transfer encryption, workflow definition, accreditation application, electronic seal and trail trace.
系统开发涉及身份验证、数字签名与传输加密、工作流定义、审批应用、电子签章和痕迹跟踪等关键安全技术。
In downtown Vancouver, some roads are already closed, and rings of security fencing surround some key venues.
在温哥华市中心,一些道路已经关闭,一些主要场所周围设置了安全围栏。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
One report suggests he was in charge of several road checkpoints around the capital, which were a key part of security defences.
一份报道显示,他负责首都周围几个道路检查点的安全,这是安全防御的关键部分。
Understanding the answer to that question is the key to building meaningful security using SSL.
理解该问题答案的关键是使用SSL构建有意义安全性的关键。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
"Public education is key," Daniel J. Kaniewski, a security expert at George Washington University, said in an interview.
“公众教育是关键,”乔治华盛顿大学安全专家丹尼尔·j·凯涅维斯基在接受采访时说。
An application security posture questionnaire, a detailed worksheet that helps extract key information about the security posture of off-the-shelf software.
一个应用软件安全情况的调查问卷表,是一个详细的工作表,可以帮助解析出架下的安全性情况的关键信息。
Keystore is a key repository that contains EFS security information.
密钥存储库是包含EFS安全信息的密钥库。
Instead, the drives automatically generate a new security key when they start up, then wipe that key as soon as they are powered down or disconnected.
取而代之的,在驱动器启动时自动产生一个新的安全密钥,而驱动器断电或终止链接时密钥就会被删除。
To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.
为了便于使用,无线承载网络还支持“第二密钥”,也称作“用户安全密钥”,使用起来更加友好,但是安全性稍差。
Understanding the implications of transparent data flow is key to the security of XML-based applications.
理解透明数据流的牵涉对于基于XML的应用程序的安全性来说至关重要。
The Organization needs to grab hold of the core issues and key factors affecting regional security and put in place a full - fledged system for security cooperation.
上海合作组织要把握影响地区安全的核心问题与关键因素,建立更加完善的安全合作体系。
In the context of digital security, a key is a piece of data which is used to encrypt or decrypt other pieces of data.
在数字安全语境中,密钥是一段数据,用于对其他数据进行加密或解密。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
This article covers the basics of working with images, starting and stopping instances of those images, and the key pairs and security groups that let you secure the instances.
本文介绍关于使用映像、启动和停止映像实例、保护映像实例的密匙对和安全组的基础知识。
Hopefully, most readers realize that security is a key aspect of enterprise systems.
令人欣慰的是,大多数读者都能够认识到安全性是企业系统的一个关键方面。
This article outlined the key players and security attacks and defenses in an e-Commerce system.
本文概述了e - Commerce系统中的关键参与者,安全性攻击和防御。
The values for the image ID, key name, and security group are passed to the manage_instance.php page via HTTP POST.
映像id、密匙名称和安全组的值通过HTTPPOST传递到manage _ instance. php页面。
The values for the image ID, key name, and security group are passed to the manage_instance.php page via HTTP POST.
映像id、密匙名称和安全组的值通过HTTPPOST传递到manage _ instance. php页面。
应用推荐