目标系统上拥有足够访问权的合法用户。
A valid user on the target system with sufficient access rights.
认证机制是为合法用户提供安全保障。
Authentication mechanism is to provide security protection for legal users.
只有合法用户能访问服务(包括拒绝欺诈阴谋)。
Only legitimate users can access the services (including the denial of spoofing schemes).
CLC检查用户数据库并为合法用户创建一个新的对话。
CLC checks it with the user database and creates a new session for valid user.
这种签名是验证合法用户是否是此消息的作者的一种方式。
This signature is a means of verifying that the legitimate user is the author of this message.
您是否担心会有特殊类型的攻击,如攻击者假扮合法用户?
Are there any particular kinds of attacks you're worried about, such as attackers impersonating legitimate users?
这样,您就可以保证只有合法用户可以访问他们需要的信息。
You might need to limit the members that a role can access to ensure that only legitimate users have access to the information they need.
识别合法用户是计算机安全保密的一项重要内容。
It is one of the important contents to distinguish legal users in computer security and secrecy.
CLC检查数据库中的用户ID并为合法用户创建一个新的会话。
CLC checks the user id in the database and creates a new session for valid user.
校园网ip地址的盗用给合法用户带来了很大的不便。
IP address usurping on the campus Intranet has caused great inconvenience to legal users.
第二个修改是去除敌手能够接受与合法用户一样的信息这一假设。
The second, crucial modification removes the assumption that the adversary receives exactly the same information as the legitimate users.
并且它还能有效防止非法用户访问系统资源和合法用户非法使用资源。
And it can effectively prevent illegal users access system resources and legitimate users illegally use of resources.
如果系统或服务不可用,合法用户就无法使用受攻击系统上的网络服务(见图2)。
Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).
在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。
In computer security, an attempt to gain access to a system by posing as an authorized user.
当一个合法用户使用这个会话标识符创建一个会话时,该会话标识符可能会被恶意使用。
The session identifier can then be used maliciously when a legitimate user creates a session with the same session identifier.
手边有了合法用户的标记,黑客可以继续扮演用户与站点交互,从而冒充用户。
With the token of the legitimate user in hand, the attacker can proceed to act as the user in interaction with the site, thus to impersonate the user.
若识别码(密码)被他人获悉,则他人可轻易假冒合法用户的身份进入受控区域。
The user will be refused, if they forgot their codes, and once the others know the id (Password), they can easily fake the legal user identity enter the controlled area.
如何确保网上信息安全传输、保护合法用户权益是目前亟待解决的一个关键性问题。
At present, the problems on how to insure information's security and protect the rights of authorized users are the key social issues to be solved.
对于身份认证系统来说,最重要的技术指标是合法用户的身份是否易于被其他人冒充。
For IA system, the most important index of technology is whether the identity of legal users is faked by others easily.
就因为某些傻瓜认为我的软件能帮助他们传播盗版,而因此惩罚那些合法用户的话,我觉得不公平。
I don't think it's fair to punish legitimate users for the actions of morons who think my app will help them pirate.
本文提出了一种有效的识别合法用户的方法,该方法具有良好的抗猜测性,而且易于实现。
This paper puts forword an effective method to distinguish legal users. The method is typical of good anti-conjecture and quick realization.
其他的一些法律纠纷的缘由则是spider和scraper所占用的带宽影响了合法用户的使用。
Other lawsuits claim that the bandwidth taken by the spiders and scrapers detracts from legitimate users.
IP地址盗用是校园网管理中一个严重的问题,它损害合法用户的权益,影响网络的正常运行。
The IP address embezzlement is a serious problem in the campus net management. It affects the benefits of user and the normal operation of a network.
如果单个证书被破坏,则MQ管理员就无法采取任何措施在队列管理器中阻止它,且不影响所有其他合法用户。
If a single certificate is compromised, the MQ administrator cannot do anything at the queue manager to block it without affecting all the other legitimate users.
旨在更好地延伸图书馆电子资源的服务空间,方便合法用户的使用,提高图书馆电子资源的利用率。
The aim is to extend services of library electronic resources, to facilitate the access of legal users and to improve the usage factor of these resources.
在网络上如何保证合法用户对资源的合法访问以及如何防止网络黑客攻击,成为网络安全的主要内容。
How to guarantee the legal user's legal access to resources and protect hackers' attacks has been the mostly content of network security.
这看起来不是一件什么大不了的事,但是攻击者基本上是通过伪装成合法用户然后取得用户的所有权限。
This might not seem like a big deal, but the attacker has essentially masqueraded as a legitimate user and gained all the potential access that the user has.
Collage也意欲模仿合法用户的流量模式,这样一来就不会产生电子指纹,而电子指纹可能会提示非法行为。
Collage also aims to mimic the traffic patterns of legitimate users, so that digital fingerprints which may suggest illicit behaviour are not produced.
Collage也意欲模仿合法用户的流量模式,这样一来就不会产生电子指纹,而电子指纹可能会提示非法行为。
Collage also aims to mimic the traffic patterns of legitimate users, so that digital fingerprints which may suggest illicit behaviour are not produced.
应用推荐