Identify your security requirements.
确定您的安全性需求。
Security requirements for SaaS applications.
SaaS应用程序的安全需求。
A traceability solution has significant security requirements.
可跟踪性解决方案有严格的安全性需求。
Consider the SSRM to address security requirements for the SOA.
考虑使用SSRM来处理SOA的安全需求。
Table 1: Security requirements satisfied by SOAP-DSIG and SSL 1.
表1:用SOAP - DSIG和SSL 1满足的安全性要求。
Satisfying security requirements without hamstringing programmers.
无需程序员即可满足安全需求。
Depending on the application, there can be additional security requirements.
根据应用程序的不同,可能会有额外的安全需求。
Analyze the security requirements and set up role models (define user types).
分析安全需要并设置角色模型(定义用户类型)。
Here, I'll consider authentication as involving two kinds of security requirements.
在这里,我将身份验证看作是两种安全性要求的结合。
Satisfy the entire set of security requirements listed in the requirements document.
满足需求文档中列出的整个安全需求集。
Table 1 summarizes which security requirements can be satisfied by SOAP-DSIG and SSL.
表1总结了哪些安全性要求能通过SOAP -DSIG和ssl来满足。
A multi-tenant, efficient SaaS application has several security requirements including.
多承租者、高效的SaaS应用程序具有以下几点安全需求。
How can security requirements be met, such that each user sees only what she is supposed to see?
如何满足安全性需求,使每个用户只看到他/她应该看到的内容。
Good security requirements and analysis practices will significantly reduce system security risk.
良好的安全需求与分析实践将极大地减少系统安全风险。
We almost always run SQL Relay on dedicated virtual machines, to match our security requirements.
我们几乎总是在专门的虚拟机上运行SQLRelay,以满足安全需求。
But once the system has been installed to meet security requirements, only half the battle is won.
但是为了确保满足安全性需求而安装系统之后,整个战役才打赢了一半。
Here, the "SOA security cloud" represents all security services meeting all SOA security requirements.
这里的“SOA安全集合”代表满足所有 SOA 安全需求的所有安全服务。
Just have one list, either an allow list or deny list depending on what your security requirements are.
应该根据自己的安全需求,只使用允许列表或拒绝列表之一。
That is, you will need to plan for security requirements when you design the layout of your topic trees.
也就是说,设计主题树布局时需要计划安全性要求。
A review of security requirements and implementation is an important part of this stage of the assessment.
对安全需求和实现的检查是这一阶段评估的重要部分。
Their failure doesn't directly impact the completion of a transaction, and security requirements are minimal.
它们的失败并不会直接影响事务的完成,安全需求最小。
The CC identifies two major kinds of security requirements: assurance requirements and functional requirements.
CC确定了两类主要的安全性需求:保证需求和功能性需求。
They have to design and implement software solutions and applications that meet these tight security requirements.
它们必须设计和实现能够满足这些严格的安全需求的软件解决方案和应用程序。
Before you can determine if a program is secure, you need to determine exactly what its security requirements are.
在您可以确定程序是否安全之前,需要先确切地确定其安全性需求是什么。
While designing the policy for a region, take into consideration the security requirements for deployment as well.
在设计一个区域的政策时,还应考虑到部署的安全需求。
In the following sections, I'll summarize the security technologies that realize the above two security requirements.
在下一部分中,我将概述一下实现以上两项安全性要求的安全性技术。
Once you know your program's security objectives, you can identify the security requirements by filling in more detail.
一旦知道了程序的安全性目标,就可以通过更详细地填充其内容来确定安全性需求。
In addition to the above two security requirements, non-repudiation is an important requirement in B2B applications as well.
除了以上两项安全性要求以外,不可抵赖性也是B2B应用中相当重要的一个要求。
NIS + is, however, significantly more difficult and complex to set up and keep running because of the security requirements.
不过,由于安全方面的要求,NIS +的设置和正常运行较为困难,更为复杂。
NIS + is, however, significantly more difficult and complex to set up and keep running because of the security requirements.
不过,由于安全方面的要求,NIS +的设置和正常运行较为困难,更为复杂。
应用推荐