• 仍然可以控制证书但是不能控制证书

    You still control the certificates, but you do not control the root certificate.

    youdao

  • 这些被称为软件发布状态密钥公钥控制证书验证过程行为

    These keys, called the Software Publishing State keys, control the behavior of the certificate verification process.

    youdao

  • 这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    youdao

  • 就是CA控制所有证书

    You are the ca and control all certificates.

    youdao

  • 这个项目正在研究一个JEST响应内容可以如何基于请求客户端的证书进行验证细粒度数据控制

    The project is investigating how the content of a JEST response can be authenticated or controlled at a fine-grained data level based on the requesting client's credentials.

    youdao

  • 事实上证书可能会散放某人工作站移动电脑上,并且提供物理访问控制非常小,进一步复杂化了问题。

    This is compounded by the fact that the certificate may be "in the wild" on somebody's workstation or mobile computer with minimal physical access controls.

    youdao

  • 可以控制用户证书绑定

    You can control the binding of the user to the certificate.

    youdao

  • 管理控制台中选择一个个人证书显示它的指纹

    Selecting a personal certificate in the admin console displays its fingerprint.

    youdao

  • 控制用户证书绑定

    You control the binding of the user to the certificate.

    youdao

  • 管理证书结构命名验证到期时间但是前所述您不能控制证书

    You manage the certificate structure, naming, validation, and expiration, but as we mentioned, you cannot control the root certificate.

    youdao

  • 传输层安全消息级安全、入侵保护身份认证访问控制——安全的确一等公民而且网关证书证实这一点

    Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.

    youdao

  • 使用由CA签名的证书时,MQ管理员控制允许连接DistinguishedNames (DN)字符串匹配模板

    With CA-signed certificates, the MQ administrator controls only the string matching template for Distinguished Names (DN) that are allowed to connect.

    youdao

  • Snap - in “certificate添加控制台中之后,看到下面的证书类别

    Once the Snap-in "certificate" is added to the console, you get the certificate categories as listed below.

    youdao

  • 一点可以通过使用 X. 509 V3格式发布数字证书完成当然要假定供应商证书完全控制未经授权用户不可能证书)。

    This can be done via a digital certificate published in X.509 V3 format (assuming, of course, the vendor has complete control of the certificate and unauthorized people don't have it).

    youdao

  • 船舶卫生控制措施证书最长有效期6个月

    The SSCC is valid for a maximum period of 6 months.

    youdao

  • 必须完成控制措施重新签发船舶卫生控制措施证书

    The control measures must be completed before a further SSCC is issued.

    youdao

  • 使用管理控制创建签名证书,具体操作如下

    Create a self-signed certificate using the administrative console as follows.

    youdao

  • 我们可以使用一个称为Microsoft管理控制(MMC)的工具管理Windows证书注册表

    We can manage the Windows certificate registry using a tool called the Microsoft Management Console (MMC).

    youdao

  • 拥有ScrumMaster认证证书项目管理问题控制长期经验拥有项目管理方法广泛知识

    She is a certified scrum master and has long-term experience in managing projects, issue control and has broad knowledge of several project management methods.

    youdao

  • 如果无法访问iManager控制但是需要查明服务器提供证书,可以采用以下方法

    When there is no access to the IManager console but you need to find out about the certificate the server presents, here is a way.

    youdao

  • 签发船舶卫生控制措施证书及附件13提及条款

    the issuance of SSCC and the provisions referred to in Annexes 1 and 3;

    youdao

  • WAS管理控制中的Signer证书

    Signer certificates in WAS admin console.

    youdao

  • 最后使用此策略构造了一个基于属性证书授权访问控制模型,能够灵活方便实现电子政务中的安全访问控制

    At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.

    youdao

  • 基于SPKI技术提出组播分布式访问控制系统MDAC,并提出了基于二叉授权委托的委托证书路径(DCP)查找算法

    Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path (DCP) searching algorithm based on binary tree.

    youdao

  • 为了设计交叉访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户PK I方法

    In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.

    youdao

  • 访问决策子系统负责解析用户属性证书提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制

    It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.

    youdao

  • 完整设计了模型整个可实现框架包括各组成模块的功能相关数据结构消息编码格式证书管理密钥的设计,以及具体访问控制流程

    Those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on.

    youdao

  • 完整设计了模型整个可实现框架包括各组成模块的功能相关数据结构消息编码格式证书管理密钥的设计,以及具体访问控制流程

    Those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定