单词 | WS-Security | ||||||||||||
释义 | WS-Security
更多释义 收起释义 例句释义: 安全性,网络服务安全,服务安全性 1. In WebSphere, this metadata is known as the Caller and is configured as part of the binding for WS-Security, as we'll show in this article. 在WebSphere中,这些元数据称作Caller并被配置为WS-Security绑定的一部分,本文将展示这一点。 www.ibm.com 2. WS-Security may be a sign of this settlement which makes use of other security specifications as the foundation of its security framework. WS-Security采用其他保安规格作为其保安架构的基础,可能会是解决这保安问题的方案。 www.info.gov.hk 3. Authenticity is an area in which WS-Security provides features that SSL can't match, even for a direct connection between client and server. 在真实性方面,WS-Security所提供的特性是SLL所无法匹及的,即使针对客户机与服务器之间的直接连接。 www.ibm.com 4. To do this, apply the WS-Security standard to indicate which bit of the message has been hashed. 为此,可以应用WS-Security标准来指示消息的哪些位已进行了散列操作。 www.ibm.com 5. UsernameToken's simplicity makes it a good starting point, but it isn't a typical use of WS-Security. UsernameToken很简单,很适合作为起点,但这不是WS-Security的典型用法。 www.ibm.com 6. WS-Security provides essential features for securing enterprise web services but often comes with a heavy performance cost. WS-Security提供了必要的特性以保证商务Web服务的安全,但经常会付出沉重的性能代价。 www.ibm.com 7. Another way of cutting the performance cost of WS-Security is to offload the security processing onto specialized hardware. 降低WS-Security性能成本的另一种方法是将安全性处理转嫁给专门的硬件来完成。 www.ibm.com 8. The use of the WS Security Username token profile is common and enables a user name and password to be encapsulated in a security token. WSSecurityUsername令牌配置文件的使用很常见,允许将用户名和密码封装到安全令牌中。 www.ibm.com 9. The sample Web service provider application is configured to use WS-Security with a lightweight Third Party Authentication (LTPA) token. 实例Web服务提供者应用程序配置为通过轻量级第三方认证(LightweightThirdPartyAuthentication,LTPA)令牌使用WS-Security。 www.ibm.com 10. The scenario outlined below is one of many possibilities that can be realized with WS-Security. 下面概述的场景是众多可以使用Web服务安全性(WS-Security)实现的可能性中的一个。 www.ibm.com 1. As Web services are more broadly applied, HTTP level security will need to be replaced by the WS-Security related mechanisms. 随着Web服务被更广泛地应用,需要用与WS-Security相关的机制来代替HTTP级安全性。 www-128.ibm.com 2. WS-Security has standardized header blocks, known as tokens, that can be used to store this information. WS-Security已经标准化了可用于存储此信息的标头块(也称为令牌)。 www.ibm.com 3. The provider gateway will take this DN and propagate it to the Web service provider in an LTPA token inside a WS-Security header. 提供者网关将采用此DN,并将其传播给WS安全标头中LTPA令牌中的Web服务提供者。 www.ibm.com 4. WS-Security is an implementation of the WS-Security specification enabling security at the message layer. WS-Security是对在消息层启用安全性的WS-Security规范的实现。 msdn2.microsoft.com 5. For identification, you can use WS-Security Username token embedded into the header of the SOAP message sent by the client application. 对于身份验证,您可以使用嵌入到SOAP消息的头部并由客户端应用程序发送的WS-SecurityUsername令牌。 www.ibm.com 6. Successively, the WS-Security configuration and binding must be attached to the Inbound Service port, as below figure shows. 随后,WS-Security配置和绑定必须附加到入站服务端口,如下图所示 www.ibm.com 7. See " The high cost of (WS-)Security " for full details and a sample request-response message pair. 参阅“WS-Security的大开销”了解更多详细信息和一个请求-响应消息对示例。 www.ibm.com 8. As Figure 1 shows, WS-Security is a Web Service security standard on which other Web Services security standards are built. 如图1所示,WS-Security是一个Web服务安全性标准,其他的Web服务安全性标准构建在它的上面。 www.ibm.com 9. As a part of the request, the client application sends a user id and password wrapped in the WS-Security Username Token. 作为请求的一部分,这个客户端应用程序发送打包在WS-SecurityUsernameToken中的用户id和密码。 www.ibm.com 10. Operation require the use of WS-Security-based authentication, using a REST-style interaction pattern would not make sense. 操作需要基于WS-Security的认证,而基于REST-style的交互模式将根本无需考虑。 www-128.ibm.com 1. Beyond the DOM issue, much of the WS-Security overhead is the computationally intensive work of generating digests and encrypting data. 除了DOM问题之外,大部分WS-Security开销都是计算紧密型的生成摘要和加密数据的任务。 www.ibm.com 2. Now that you've seen the effect of WS-Security on both processing time and message size, you might be wondering when it's worth the cost. 您已经了解了WS-Security对处理时间和消息大小的影响。您可能想知道这些代价何时才是值得的。 www.ibm.com 3. The WS-Security standard specifies extensions to SOAP messaging that provide message-level integrity, confidentiality, and authentication. 在WS-Security标准规定扩展SOAP消息提供消息级别的完整性,保密性和身份验证。 www.sunnybtoc.com 4. This is the same policy used in " Axis2 WS-Security signing and encryption, " now extracted into a separate policy document. 这里使用了与“Axis2WS-Security签名和加密”相同的策略,现在被提取到一个独立的策略文档中。 www.ibm.com 5. WS-Security is approved and is now being supported by various vendors. WS-Security是被认可的,并且现在也得到了很多销售商的大力支持。 www-128.ibm.com 6. As you've seen in prior articles in this series, WS-Security can add a lot of bulk to SOAP message headers. 从系列的前一篇文章中看到,WS-Security可以会向SOAP消息报头添加大量块(bulk)。 www.ibm.com 7. WS-Security needs to be turned off for the EchoService to allow the request to be passed to the service end point for processing. 需要关闭EchoService的WS-Security来允许将请求传递到服务端点进行处理。 www.ibm.com 8. The WS-Security standard provides mechanisms for applying authentication, integrity, and confidentiality to SOAP messages. WS-Security标准提供了将身份验证、完整性和保密性应用到SOAP消息的机制。 www.ibm.com 9. I'll cover some specialized WS-Security features in future articles, but for now it's time to wrap up the focus on security performance. 我将在将来的文章中介绍具体的WS-Security特性,但是现在是时候对安全性性能进行总结了。 www.ibm.com 10. Remember to replace the com. ibm. ws. security. spnego. SPN1. hostName value with your real configuration variable. 记住要用您的实际配置变量替换com.ibm.ws.security.spnego.SPN1.hostName值。 www.ibm.com 1. The static configuration approach can be convenient when you're using fixed values for WS-Security parameters. 如果要使用固定的WS-Security参数值,静态配置方法比较方便。 www.ibm.com 2. Security interoperability: Web services calls need to be signed and encrypted (WS-Security). 安全互操作性:Web服务调用需要签名及加密(WS-Security)。 www.ibm.com 3. You can use WSS4J in a standalone manner or in tandem with Axis to create and process WS-Security elements within a SOAP envelope. 你可以使用一个独立的方式WSS4J或与轴的同时,将创建和处理SOAP信封内的WS-Security的元素。 www.sunnybtoc.com 4. Figure 8 shows an architecture in which a gateway on the server side is not acting in role assigned to the WS-Security header. 图8显示了服务器端网关不具有指定给WS-SecurityHeader的角色的体系结构。 www.ibm.com 5. The stacks don't support using WS-Security asymmetric encryption for only encrypting a message, instead requiring signing to be done also. 这些工具并不支持使用WS-Security对称加密来只加密一条消息,而是同时还要求使用签名才能完成。 www.ibm.com 6. Some XML gateway appliances provide accelerated processing of WS-Security encryption and signatures. 一些XML网关工具提供了对WS-Security加密和签名的加速处理。 www.ibm.com 7. At the client, WS-Security receives the response, validates the digital signature, and decrypts the message. WS-Security在客户机接收响应,验证数字签名和解密消息。 www.ibm.com 8. WS-Security enables collaboration between other Web services security standards and protocols. WS-Security的实现与其他Web服务安全标准和协议的合作。 www.sunnybtoc.com 9. The performance overhead of using WS-Security signing and encryption is substantial for all the stacks tested. 接受测试的栈在使用WS-Security签名和加密方面的性能开销都很大。 www.ibm.com 10. As mentioned, tokens are placed in a WS-Security header inside the SOAP: envelope header element. 正如前面提到的,令牌被放在WS-Security标头的SOAP:envelope标头元素中。 www.ibm.com 1. Together these two standards support describing WS-Security requirements in machine-readable form. 这两者合起来可以以机器可读的方式描述WS-Security需求。 www.ibm.com 2. You ll use that WSDL to build the code for the rest of the application, then add security using the WS-Security standard. 您将使用WSDL来为应用程序的其他部分构建代码,然后使用WS-Security标准来增加安全性。 www-128.ibm.com 3. Like Metro, CXF comes complete with support for WS-Security and other extension technologies as part of the basic download. 与Metro相同的是,CXF完全支持WS-Security和其他扩展技术,将其作为基础下载的一部分。 www.ibm.com 4. The tooling additionally provides support for SOAP over JMS for EJB-based Web services and integration of WS-Security options. 这些工具还为基于EJB的Web服务和集成Web服务安全性这两个选项支持通过JMS的SOAP。 www.ibm.com 5. Prior to the message being sent onto the wire from the client, WS-Security used asymmetric keys to digitally sign and encrypt the message. 从客户机将消息发送到网络之前,WS-Security使用了非对称密钥对消息进行数字签名和加密。 www.ibm.com 6. Proxy mode deployments may not specify a WS-Security configuration for the target service. 而代理模式部署不能为目标服务指定WS-Security配置。 www.ibm.com 7. Together with SAML or WS-Security, the new APIs could support automatic identification and single sign-on Web services. 加上SAML或WS-Security,新API就能够支持自动标识和单点登录Web服务了。 www.ibm.com 8. In this article, you'll see some simple examples of WS-Security headers, with only a single token. 在本文中,您将看到一些WS-Security头部示例,并且只包含单个令牌。 www.ibm.com 9. WS-Security used the asymmetric keys to digitally sign and encrypt the response message prior to sending the message onto the wire. 在将消息发送到网络之前,WS-Security使用了非对称密钥对响应消息进行数字签名和加密。 www.ibm.com 10. Business-to-Business integration requires the secure messaging features of WS-Security. B2B整合要求Web服务安全性(WS-Security)提供的安全消息传输特性。 www.ibm.com 1. Using the WAS Console, we will ensure that the WS-Security is no longer configured. 通过使用WAS控制台,我们将确保不再配置WS-Security。 www.ibm.com 2. You can click EchoService in the Name field to confirm the WS-Security and binding settings as depicted in Figure 12. 您可以在Name字段中单击EchoService,以确认如图12中显示的WS-Security和绑定设置。 www.ibm.com 3. You are discussing some of the aspects of security in the Synapse description, including WS-Security implementation. 您在书中描述Synapse时,讨论了安全的某些方面,包括WS-Security的实现。 www.infoq.com 4. WS-Security is a standard for adding security to SOAP Web service message exchanges (see Resources). WS-Security是向SOAPWeb服务消息交换添加安全性的一种标准(见参考资料)。 www.ibm.com 5. But first, in next month's installment, I'll discuss using symmetric encryption with regular WS-Security. 但在下个月的专栏中,我们将首先讨论使用对称加密及常规WS-Security。 www.ibm.com 6. It supports SSL for protocol-level security and WS-Security for message-level security of SOAP Web services. 它支持使用SSL实现协议级安全,使用WS-Security实现SOAPWeb服务的消息级安全。 www.ibm.com 7. Similar to these other stacks, CXF uses WS-SecurityPolicy to configure WS-Security handling (though manual configuration is also possible). 与这些堆栈一样,CXF也使用WS-SecurityPolicy配置WS-Security安全处理(也可以手工配置)。 www.ibm.com 8. Examples of such protocols include WS-Security and WS-Reliability. 此类协议的示例包括WS-Security和WS-Reliability。 msdn2.microsoft.com 9. There are no WS-Security or other complex security considerations. 不存在WS-Security或其他复杂的安全性考虑。 www.ibm.com 10. UsernameToken provides a standard way of representing a username and password pair with WS-Security. UsernameToken是向WS-Security提供用户名和密码对的标准方法。 www.ibm.com 1. Figure 4 shows the conversion from a WSDL document attached to a WS-Security Policy to a UML model. 图4显示了从附着于WS-SecurityPolicy的WSDL文档转变为UML模型。 www.ibm.com 2. The example above is an entry-level WS-Security architecture. 上面例子是入门级的WS-Security体系结构。 www.ibm.com 3. Support for Web services standards including WS-Security standards. 支持Web服务标准,包括Web服务安全性标准。 www.ibm.com 4. This requires a careful establishment of trust relationships, typically using the WS-Security standards. 这要求仔细地确立可靠的关系,特别要使用WS-Security标准。 www.ibm.com 5. In these cases, WS-Security (or its offspring, WS-SecureConversation) is required, and the performance cost is simply a necessary expense. 在这些情况中,就必须使用WS-Security(或者它的后代WS-SecureConversation),而且性能成本也成为必要的开销。 www.ibm.com 6. You can use these appliances to handle the heavy-duty WS-Security processing while working with plain SOAP in your application. 您可以使用这些工具来处理大开销的WS-Security,同时处理应用程序中的纯SOAP。 www.ibm.com 7. All major web services stacks provide some level of support for WS-Security and related web services security standards. 所有主要web服务栈都为WS-Security和相关web服务安全性标准提供一定程度的支持。 www.ibm.com 8. The default WS-Security policy will be removed from the web services application server service. 将从Web服务应用服务器服务中删除缺省WS-Security策略。 www.ibm.com 9. This means the WS-Security configuration adds significant per-request overhead, which shows up mainly in the Figure 1 timings. 这意味着WS-Security配置为每个请求带来严重的过载,这主要显示在图1的时间中。 www.ibm.com 10. But even a fix to this issue will probably not affect the other WS-Security times. 但是,即使修复了此问题可能也不会影响其他的WS-Security运行时间。 www.ibm.com 1. WS-Security provides multiple ways in which one can authenticate a user when they need to access a service. 当用户需要访问服务时,WS-Security提供多种验证用户身份的方式。 www.ibm.com 2. This is fine for entry-level WS-Security, but will not scale sufficiently well when large numbers of clients and services are involved. 这对于入门级WS-Security完全足够,但当涉及大量客户端和服务时则无法具有足够的可伸缩性。 www.ibm.com 3. 0ther patterns -- such as a WS-security pattern -- that directly impact the service definition would be applied at this layer. 其他直接影响服务定义的模式——如WS-security模式——也可应用于这个层。 www.ibm.com 4. A major part of the WS-Security performance cost comes from the wide use of asymmetric encryption. WS-Security之所以常常伴随性能损失主要是因为大量使用了非对称加密。 www.ibm.com 5. This is the same configuration used in earlier articles with Axis2 examples of WS-Security asymmetric signing and encrypting. 这与此前文章中WS-Security非对称签名和加密的Axis2例子中的配置一致。 www.ibm.com 6. The good news is that WebSphere Application Server support of WS-Security is through a declarative model. 好消息是,WebSphereApplicationServer对Web服务安全性(WS-Security)的支持是通过声明性的模型进行的。 www.ibm.com 7. By default, the WS-Security policy is created with message-level protection, as described in Part 1. 默认情况下,WS-Security策略在创建时使用了消息级别的保护,如第1部分所述。 www.ibm.com 8. You should exercise caution when comparing the impact of WS-Security and a transport-dependent-based alternative such as HTTPS. 在比较Web服务安全性(WS-Security)和基于传输协议(比如HTTPS)的可选方案的影响时,您应该保持谨慎。 www.ibm.com 9. Of course, writing WS-Security in E4X, while possible, would probably not be much fun (we didn't try it yet! ). 当然,可能的情况下在E4X中使用Web服务安全,可能不是那么有趣(我们还没有试过!) www.ibm.com 10. The WSS4J framework provides the core methods you need to meet the WS-Security specifications. 该WSS4J框架提供了您需要满足的WS-Security规范的核心方法。 www.sunnybtoc.com 1. Listing 2 shows how you can set the username and password for WS-Security handling in this property map. 清单2演示如何在属性映射中为WS-Security处理设置用户名和密码。 www.ibm.com 2. An example of policy definition is the WS-Security standard policy grammar for security. 策略定义的一个例子是关于安全的标准策略语法WS-Security。 www.ibm.com 3. Is compliance to a security standard security, such as Kerberos or WS-Security, required? 是否需要遵守行业安全标准,例如Kerberos或WS-Security? www.ibm.com 4. Below are three real-world customer uses of WS-Security. 下面是现实世界中客户实际使用Web服务安全性(WS-Security)的场景。 www.ibm.com 5. To see the actual WS-Security information in the messages, you need to use a tool such as TCPMon (see Resources). 要查看消息中的实际WS-Security信息,需要使用TCPMon之类的工具(见参考资料)。 www.ibm.com 6. They are compatible with other runtimes that support the WS-Security proposed standard. 它们与支持WS-Security提议标准的其他运行时兼容。 www-128.ibm.com 7. As part of the fix, CXF 2. 1. 7 skips adding WS-Security handling to the response message flow in this particular case. 作为修复的一部分,CXF2.1.7在这种特殊情况下将跳过将WS-Security处理添加到响应消息流中的步骤。 www.ibm.com 8. For many applications the features of WS-Security are essential, but they can come at a significant performance cost. 对于很多应用程序,WS-Security的特性必不可少,但往往要以牺牲性能为代价。 www.ibm.com 9. Beyond the basics of Web service message exchange, Metro also supports SOAP extensions such as WS-Security. 除了基本的Web服务消息交换外,Metro还支持SOAP扩展,例如WS-Security。 www.ibm.com 10. It can be applied in combination with message level security (WS-Security). 可以将其与消息级安全性(WS-Security)结合使用。 www.ibm.com 1. Metro does even better with direct use of symmetric encryption with WS-Security, running about 30 percent faster. Metro甚至比直接使用对称加密实现WS-Security还要快一些,大约快30%。 www.ibm.com 2. If you're using the Tech Preview WS-Security header generation with X. 509 certificates, you're in good shape. 如果您正在使用带X.509证书的那一版技术预览WS-Security头,那就可以了。 www.ibm.com 3. Because you also want security on insecure transports you use message-level security mechanisms such as WS-Security. 由于您还希望非安全传输上的安全性,因此需要使用消息级安全机制,比如WS-Security。 www.ibm.com 4. As discussed in " Axis2 WS-Security signing and encryption, " asymmetric encryption is a useful tool because it works with key pairs. 正如在“Axis2WS-Security签名和加密”一文中讨论的,非对称加密由于可处理密匙对,因此是一种很有用的工具。 www.ibm.com 5. Built in Web services and XML security features in support of leading industry standards such as WS-Security. 内置Web服务和XML安全特性,以支持领先的行业标准,如WS-Security。 www.ibm.com 6. The requirements might call for WS-Security, for example, or support for a complex industry standard schema. 例如,需求可能是WS-Security,或支持复杂的工业标准模式。 www.ibm.com 7. The Listing 8 properties file is used by the underlying WSS4J WS-Security code to configure the signature and encryption processing. 底层的WSS4JWS-Security代码使用清单8所示的属性文件配置签名和加密处理。 www.ibm.com 8. Question: Axis WS-Security implementation is based on handlers so that you can don't have to change the code to secure it. 问:AxisWS-Security实现是基于处理程序的,所以不必通过更改代码来保护它。 www.ibm.com 9. Advanced Web services features such as JAX-RPC handlers and WS-Security can be used with inbound and outbound services in SIBus. 高级Web服务特性(如JAX-RPC处理程序和WS-Security)可以用于SIBus中的入站和出站服务。 www.ibm.com 10. The WS-Security run time is inserted in the web service processing chain when the application is deployed. 当部署应用程序时,WS-Security运行时插入Web服务处理链中。 www.ibm.com 1. WS-Security implementations use a key that is randomly generated. Web服务安全性(WS-Security)实现使用一个随机生成的密钥。 www.ibm.com 2. This is probably the most widely used technique for signing or encrypting messages with WS-Security, and it does have some advantages. 这是使用WS-Security进行消息签名或加密中最广泛使用的技术,而且它有一些优势。 www.ibm.com 3. EviWare also introduced support for WS-Security 1. 0 (March 2004) using UserName or X. 509 tokens. EviWare还引入了对基于用户名或X.509令牌的WS-Security1.0(2004年3月发布)规范的支持。 www.infoq.com 4. Adds a SAML Authentication Assertion (encapsulated into a WS-Security header) containing 添加SAML验证断言(封装成的WS-Security标头),其中包括 www.ibm.com 5. Definition of the Web Service WS-Security configuration and binding for the incoming messages and attach them to the inbound service port 定义传入消息的WebServiceWS-Security配置和绑定并附加它们到入站服务端口 www.ibm.com 6. See how the upcoming Web services security protocols work - read the WS-Security Profile for XML-based Tokens 请了解即将出现的Web服务安全性协议的工作原理请在 www-128.ibm.com 7. Figure 7 shows an architecture in which a gateway on the server side acts in a role assigned to the WS-Security header 图7显示了服务器端网关具有指定给WS-SecurityHeader的角色的体系结构。 www.ibm.com 8. Discusses the message flow, WS-Security configuration, and the associated files for point-to-point Web services without an intermediary 讨论没有中间层的情况下点对点Web服务的消息流、WS-Security配置以及关联的文件。 www.ibm.com 9. Shows you the message flow, WS-Security configuration, and the associated files with an intermediary 介绍采用中间层时的消息流、WS-Security配置以及关联的文件。 www.ibm.com 10. Secure internal communication using SOAP with WS-security 安全的内部通信,使用SOAP和WS-Security www.infoq.com 1. Apply and remove message level security (WS-Security) 应用和清除消息级的安全(WS-Security) www.ibm.com 2. Finally, in order to support effective composition with the WS-Security family of specifications, the, 最后,为了有效地支持与WS-Security系列规范的整合, www-128.ibm.com |
||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。