另一个要了解的重点是,很多安全问题都是由于应用程序盲目信任数据输入而引起的。
Another important point to understand is that many security issues result from applications that blindly trust data input.
同时也保证了信任数据的安全存储和访问,同时增强了P 2 P网络中交易的匿名性和安全性。
Meanwhile, it ensures the secure storage and access of trust data and enhances the anonymity and security in the transaction of P2P network.
在新的模型中,每个节点都会保存高于本节点信任门限的节点信任值,由域内代理保存本域内所有节点的信任数据。
In the new model, each node saves the trust value of node that is higher than the trust threshold of itself, and the trust data of all nodes in this domain are saved by intra-domain agent.
这个非信任数据被看作是污染的数据,当这个代码确保这个数据是非恶意就称作杀毒功能,通常也称作杀毒污染的东西。
The untrusted data is referred to as tainted data, while the code ensuring that the data is not malicious is called a sanitizer, and is often said to clean the taint.
有越多的人信任供其输入数据的系统,这一点成为现实的可能性越大。
That would be far more likely if more people trusted the systems they input their data into.
XSS也是一个类似的问题。不过这一次不受信任的数据瞄准的是浏览站点的人们,而不是应用程序本身。
XSS is a similar kind of problem; this time, the untrusted data is targeted at the people browsing your site, rather than your application itself.
基于这一信任关系,应用程序可以安全地共享代码和数据。
Based on this trust relationship, applications can share code and data in a secure manner.
不论用户的忧虑是否理性,他们需要感到自己的数据是安全的:让你的用户信任你,这很重要。
Whether users' concerns are logical or emotional, they need to feel that their data is safe: it's important that your users trust you.
它现在的功能早已不限于此了,但是我们现在仍然在用它来收集和操作来自许多不受信任的源的数据。
It has grown from this seed into much more, but the fact remains that we use it to gather and manipulate data from many untrusted sources.
接受用户输入或来自不受信任来源的任何其他数据是PHP开发人员在开发应用程序时可能承担的最常见风险之一。
Accepting user input or any other data from an untrusted source is one of the most common risks a PHP developer can take when developing applications.
最早遭受破坏的,且仍旧普遍的攻击来源于开发人员对最终用户输入的数据可以信任的假设。
Some of earliest to be perpetrated, and still prevalent, attacks rely on a developer's assuming that data entered by the end user can be trusted.
“我向你们保证,我们必然会经历[失误],”他说。这段谈话会强迫人们重新考虑对于云服务的信任,重要的数据保存在上面是否安全。
"I guarantee you, there will be [a failure] in due course," he said, one that will force a recalibration of the faith people put cloud services for critical data preservation.
密钥数据库中的另一部分是信任存储区,它包含由该队列管理器信任的数据的所有公钥。
Another section in the key database is the trust store and it contains all of the public keys of things that are trusted by the queue manager.
像这样提供给我们的数据范围很宽泛,但我们能完全信任它们么?
Such figures are trotted out far and wide. But can we entirely trust them?
组织及业务流程的冲突或信任上的失败可能会阻碍对数据处理见解的进步。
Organizational and business process conflicts, or simple failures of trust, may get in the way of common sense improvements.
罗伯提议“内容的原数据,证实UGC的信任社区,创建UGC的共用隐私,关系的社区而不是东西”
Rob Inskeep suggested "meta of content, communities of trust to validate UGC, creative commons privacy for UGC. Communities of relationships, not 'things'".
然后由接收应用程序作出决定,如果它信任该断言,则接受该用户或数据块。
It is up to the receiving application to accept if it trusts the assertion.
团结也未必就是力量,因为不同部门的管理者往往对对方的数据并不信任。
Numbers do not always add up. Managers from different departments do not trust each other's figures.
聚合规则指示更新CCMS数据时信任哪个数据源(按数据组确定)。
The aggregation rules indicate which data sources (per data group) to trust when updating CCMS data.
再例如,催化资金可支持开展初步的设施评估以验证所生成数据的可靠性,由此建立所有用户对数据的信任。
As another example, catalytic funding can support an initial facility assessment to verify the reliability of data being generated, thus building confidence for all users of the data.
没有信任,没有值得信任的行为,那就是数据剥削。
Without trust, without trustworthy behaviour, it's strip mining.
提供可靠的研究或者调查过的数据对于和客户建立相互信任的关系很有帮助。
Providing credible studies or survey data goes a long way toward establishing credibility with clients.
目标是形成决策者能够信任的数据—还要向他们提供数据可信的证明。
The goal is to build data that decision makers can trust-and also provide them with evidence that the data can be trusted.
password和hibernate . connection .username是数据库的信任状。
Hibernate.connection.password and hibernate.connection.username are credentials for the database.
通常,如果联邦数据库不是分区的,受信任模式可以提供更好的性能。
In general, the trusted mode provides better performance if the federated database is not partitioned.
有时候您的程序要从一个不信任的用户处得到数据并把它传给其他的用户。
Sometimes your program will take data from an untrusted user and give it to another user.
如果有元数据,你信任元数据中的信息吗?
Do you trust the information in the metadata, if it is in there?
受信任的主机:数据库根据连接请求的来源确定是否信任这个主机。
Trusted hosts: the database assumes trust based on the source of the connection request.
但是,如果DB 2数据库从不信任的地方接收XML数据,而又需要在DB 2上确保模式遵从性,那么就需要在这方面花费一些额外的CPU周期。
If, however, your DB2 database receives XML data from untrusted sources and you need to ensure schema compliance at the DB2 level, then you need to spend some extra CPU cycles on that.
但是,如果DB 2数据库从不信任的地方接收XML数据,而又需要在DB 2上确保模式遵从性,那么就需要在这方面花费一些额外的CPU周期。
If, however, your DB2 database receives XML data from untrusted sources and you need to ensure schema compliance at the DB2 level, then you need to spend some extra CPU cycles on that.
应用推荐