Each entry in the database includes a brief description of the security vulnerability or exposure and any pertinent references.
这个数据库中的每个条目包含对安全漏洞的简要说明和相关的参考资料。
The standard J2EE security model contains a description of roles, which encompasses the security-constrained resources that can be accessed by principals.
标准J2EE安全模型包含角色的描述,包括可由主体访问的受安全机制约束的资源。
Answer: the Version 5 Tech Preview does not express security requirements in the Web Services Description Language (WSDL) files.
答:版本5技术预览并不用Web服务描述语言(Web Services Description Language,WSDL)文件表达安全性需求。
You are discussing some of the aspects of security in the Synapse description, including WS-Security implementation.
您在书中描述Synapse时,讨论了安全的某些方面,包括WS - Security的实现。
These provide the underlying messaging, description, and discovery framework basic to all web services and the message-level security characteristics necessary for many B2B integration scenarios.
这些规范提供了基础消息传递、说明和发现框架,用于所有Web服务和很多B2B集成场景所必须的消息级安全特征。
Configuring a security realm involves configuring three GBeans (see Resources for a link to a description of GBeans) : one for login module, one for login module usage, and one for the realm itself.
配置安全领域需要配置三个GBeans(参阅参考资料以链接到GBeans的说明):一个用于登录模块,一个用于登录模块使用,一个用于领域本身。
In the security Roles section, add one security role with the name All role and the description All Authenticated users in the enterprise.
在SecurityRoles区段中,添加一个名为allRole的安全角色,其描述为AllAuthenticatedusersintheenterprise。
In computer security, a description of the characteristics of an entity to which access is controlled.
在计算机安全学中,一种对存取受到控制的实体的特征的描述。
This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.
本文提出面向消息中间件的分布式认证协议,给出协议内容、形式化描述以及安全性分析。
The practical mathematic description of dynamic security region makes it easy to take account of the uncertainties of power injections and motor loads proportion.
安全域的数学描述使注入功率不确定性和电动机负荷比例不确定性的计及变得简便。
This paper gives the formal description of the two-party protocol, and discusses the security, authenticability and verifiability for two-praty protocols.
论文首先给出协议的形式化描述,然后讨论了协议的安全性、可鉴别性和可验证性。
Considering the data flow description in protocol security testing, mutation analysis is introduced based on constructed type algebra, and a new protocol security testing method is proposed.
针对协议安全测试中数据流的描述问题,在构造类别代数的基础上引入变异分析,由此提出了一种协议安全测试方法。
This paper give detail description of SI-MIS feature and relevant realization, key technology such as network data storage scheme and information security strategy are also included.
本文详细描述了其具体功能结构的设计和实现,包括网络数据存储方案和信息安全实现等关键技术。
A security policy for multilevel security, RDBMS, is proposed together with a detailed description of the discretionary security, multilevel security and the principle of least privilege.
提出了多级安全rdbms的一种安全策略,对策略中的自主安全、多级安全和最小特权原则进行了详细的叙述。
The research on environment security mainly rested on the stage of qualitative description on environment security or quantitative assessment of natural eco - environment security.
环境安全研究目前主要停留在定性描述或定量评价自然生态安全阶段。
Therefore, accurate description and calculation of the tower crane's dynamic process under outside inspiration play a very important role in tower crane's economy and security.
因此准确描述和精确计算塔机结构体系在外激励下的动态过程,对于塔机的经济性和安全性都具有非常重要的意义。
Tool Description: GS-DES map document security system, the client is not installed, you can not see the encrypted files.
工具说明:GS - DES图文档安全系统中,没有安装了客户端后,无法查看被加密的文件。
At the same time, some key problems, such as human computer interface, product engineering data modeling and description and security of the distributed system, are analyzed and described.
同时也对人机接口、产品工程数据建模,以及分布式安全等协同设计中关键问题的解决进行了分析说明。
Follow these steps, this article will analyse the IPTV service security from three aspects: threats description, security requirements analysing, and IPTV service security architecture.
本文将按照以上步骤,从威胁描述、安全需求分析、安全架构模型几个方面对IPTV业务的安全问题进行分析和梳理。
It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.
统一描述策略元素和安全规则,支持多种访问控制模型,体现了良好的通用性。
Policy description language, which is one of the core parts of the policy-based security management system, is still lack of a common standard.
作为基于策略安全管理系统核心之一的安全策略描述语言,至今没有一种业界通用的标准。
In computer security, a description of the type of authorized interactions a subject can have with an object. Permissions include: read, write, execute, add, modify and delete.
在计算机安全学中,一个主体对一个客体的合法作用类型,包括读、写、执行、添加、修改和删除。
It's probably not in the job description of the security personnel to chase the wally wasting energy!
负责巡逻的保安员,大概祇管捉贼而不会理会有谁浪费能源吧。
Job description:1, Office daily management: management, maintenance company security, cleaning, instrument equipment and resources, to ensure that the company's daily operation;
岗位职责1、办公室日常管理:管理、维护公司安保、清洁、仪器设备等资源,保证公司日常运作;
Job description:1, Office daily management: management, maintenance company security, cleaning, instrument equipment and resources, to ensure that the company's daily operation;
岗位职责1、办公室日常管理:管理、维护公司安保、清洁、仪器设备等资源,保证公司日常运作;
应用推荐