The added configuration information for this UsernameToken case is just a security callback class. 为这个UsernameToken示例添加的配置信息是一个安全回调类。
This article focused on using method-based security to protect Java class instances. 本系列的最后一篇文章主要介绍使用基于方法的安全性保护Java类实例。
This call includes the source security identifier ( sid), the security class ( constructed from the details of the requested operation), the particular socket call, and optional auxiliary audit data. 此调用包括源安全标识符(sid)、安全类(根据请求操作的详细信息构造)、特定socket调用,以及可选的辅助审计数据。
Assign deny to the Write security class. 将写安全类设为deny。
On the issue of the war are staked our national sovereignty on the high seas and the security of an important class of citizens 战争问题关系到我国在公海上的主权,关系到一个重要的公民阶层的安全
Research of Information Security Class Protect Quantification Model and Implementation of Evaluation System 信息安全等级保护量化模型研究及评估系统实现
Campus by the Campus Safety Campaign "Safety Detective" Campaign and the "small shell" campus security line class meetings of two parts. 校园安全大行动由校园“安全侦探”大行动以及“小贝壳”校园安全行主题班会两个部分组成。
Research on the Housing Security for "Sandwich Class" in City 城市夹心层群体住房保障问题研究
Programming errors in class libraries can expose security vulnerabilities because class libraries often access protected resources and unmanaged code. 类库中的编程错误会公开安全脆弱性,因为类库经常访问受保护的资源和非托管代码。
Where the classified achievements in survey and drawing are duplicated, they must be subjected to the administration corresponding to the original security class. 复制保密的测绘成果,还必须按照原密级管理。
We've got to rebuild this economy and the sense of security that middle class has felt slipping away for years. 我们必须重塑我们的经济体和中产阶级认为已经长久缺失的安全感。
However, information Security Class Protect in China is only in its primary stage of development with no valid models or tools readily available in this area. 然而,信息安全等级保护在国内才刚进行试点,缺乏具有可操作性的量化模型算法和支撑软件。
The third chapter is the analysis of the substance of procedural law in security class action. 第三章是对证券集团诉讼的程序法内容的分析。
As an essential part of basic Information Security system, Information Security Class Protect plays a very important role in protecting the security of fundamental information systems in government and company. 信息安全等级保护作为国家信息安全基本制度,对保障政府部门和企事业的基础信息系统安全有着非常重要的作用。
This paper puts forward a new framework of operating system security supporting application class security. 文章提出了一种支持应用类安全的操作系统安全结构框架。
Also, according to the real-time database and thread security class concept, the software deals with the real-time data by the means of memory database management system and improves the efficiency of the system consumedly. 同时,本文根据实时数据库和线程安全类概念,对系统中的大量公用实时数据采用内存数据库管理方式,大大提高了系统运行效率。
Since most of the commercial data base management system ( DBMS) products are lower in the security class, by considering facts, a scheme to strengthen the security of database by a security enhanced system is proposed. 由于大多数主流商用数据库产品安全级别较低,从实际角度考虑,提出了通过安全增强系统提高数据库系统的安全性。
Thus the schemes have very high security class. 因而该方案具有很高的安全性。
The second chapter focuses on the analysis of substantive law of security class action lawsuits. 第二章的内容是证券集团诉讼的实体法分析。
By using the scheme based on the one-way function, each security class chooses randomly and independently a secret key that can be used to derive his successors 'secret keys efficiently. 该方案是基于单向函数的,每个安全类可随机独立地选取组密钥,利用它能有效地得到其后继者的组密钥。
The scheme has high security class and efficiency used in signature. 实践证明该体制具有较高的安全性,而且签名效率也较高。
The Research on the Governance of the Security Class Action BAOGANG GROUP 证券集团诉讼的治理研究
This paper offers arguments for the provable security of a class of ID-based signature schemes called ID-based generic signature schemes in the random oracle model. 在随机谕示模型下,研究一类基于身份的签名体制(称为基于身份的一般签名体制)的安全性。
So it's hard to protect the Java application program, and there's a big issue about the security of Java class file. 因此Java应用程序也就毫无秘密可言,这样在源代码上就会产生很大的安全问题。
At the same time, the software deals with the real-time data by the means of memory database and uses the thread security class to maintain the data's integrity. 同时,对系统中大量实时数据则采用内存数据库管理方式,并利用线程安全类来保证读取数据的完整性。
The only way to realize this purpose is choosing correct protection class for the system, and risk assessment is the basic way to determine security protection class. 安全风险要适度,就必须正确选择系统的保护等级,而确定安全保护等级的基本方法是进行风险评估。
Based on the deficiency analysis of the military security model ( MSM), which is information flow control model based on the lattice theory, the MSM is extended in the both sides of the definition of the security class and the control policy of the information flow. 在分析基于格理论的信息流控制军用安全模型在实际应用中存在的不足的基础上,从安全类定义和信息流控制策略两个方面对原模型进行了理论扩展和安全性分析。
Emotion intervention measures is to help Xiao Yang regain confidence, find the sense of home and the collective security of class and the sense of belonging. 情感干预措施帮助小杨重新找回自信,找回家和班集体的安全感和归属感。
ⅲ biological safety cabinets provide absolute security that class ⅰ and class ⅱ biological safety cabinet can not do. 三级生物安全柜提供一级,二级安全柜无法提供的绝对安全保障。
The third classified information systems ( security label protected class) play a crucial role in classified protection. According to preliminary statistics, most of our existing information systems focus on the third classified information systems. 其中第三级信息系统(安全标记保护级)在等级保护实施中占有至关重要的地位,据初步统计我国现有的信息系统大都集中于三级信息系统,涉及到社会的各行各业。