认证路径长度和证书策略是对信任关系的限制,将其作为约束条件加到谓词逻辑中更好地反映出现实中的信任。
Certification path length and certificate policies are constraints of trust, it is reasonable to add them as conditions to the logic.
本例中我们隐含地信任robertRelyea做了个好的选择,我们也希望Mozilla的内建证书策略对其他的内建证书也是合理的。
In this case, we're implicitly trusting that Robert Relyea made a good choice. We also hope that Mozilla's built-in certificate policy is reasonable for the other built-in certificates.
添加到密匙环的每一个证书都是这个策略的一个例外。
Each certificate added to the key ring is an exception to this policy.
提前制定策略,以便根据专有名称和具体证书撤销访问。
Establish a strategy in advance for revoking access by distinguished name as well as by individual certificate.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
换句话说,对一个密匙环添加一个CA将对那个CA已经签名的或未来即将签名的每个证书建立一个信任策略。
In other words, adding a ca to a keyring establishes a trust policy for every certificate that ca has ever signed or will sign in the future.
如果SSL通道是身份验证的基础,则必须使用出口将SSL证书标识绑定到MCAUSER,以便向API调用应用访问策略。
If SSL channels are the basis for authentication, an exit must be used to tie the SSL certificate identity to an MCAUSER so that access policies can be applied to API calls.
实际上,证书类型的选择应该基于理想的安全策略和企业是否准备好建立和维护一个证书撤销列表。
The choice should really be made based on the desired security policy and whether the enterprise is prepared to set up and maintain a certificate revocation list.
所以就寻找新工作来讲,一个有效的策略是在那些关键技术上增加你的专业技能,包括获得一个相关领域的证书或者硕士学位。
So a useful tactic in finding a new job is to expand your subject matter expertise in those key technologies, which can include earning an industry-rated certification or master's degree.
对于这种策略配置,客户机证书需要受此STS信任,且此STS证书必须存在于此客户机的可信存储内。
With this policy configuration, the client certificate needs to be trusted by the STS, and the STS certificate must be present in the trust store of the client.
最后,策略规范可能要求加密订单的某些要素,指示要使用的加密技术、要使用的证书等等。
Finally, a policy specification may require that certain elements of the order are to be encrypted, denoting the encryption techniques to be used, certificates to use, etc.
要支持各种客户机运行时,请发布断言客户机运行时必须确保消息机密性,并必须提供用户身份的证据(用户 ID/密码或证书)的策略。
To achieve this, you publish policies asserting that the client runtime must ensure message confidentiality and must provide evidence of the user's identity (user ID/password or a certificate).
CA认证系统拥有高强度的加密算法,高可靠性的安全机制及完善的管理及配置策略,提供自动的密钥和证书管理服务。
Ca authentication center provides highly intensive encipher algorithm, highly liable security mechanism and management strategy, automatic generating key and certificate management.
本文介绍了西南农业大学高职教育实行“双证书”制的一些尝试,提出了存在的问题及解决的策略。
This paper introduces some efforts in carrying out double certification system in our college, and puts forward to tactics to solve the possible problems that might arise in practice.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
您可以为多个解决方案使用同一证书,并且无需额外更新安全策略即可使所有解决方案得到信任。
You can use the same certificate for multiple solutions, and all the solutions will be trusted with no additional security policy updates.
在这个领域里,要想获得学位证书要进行包括教学策略,课程设计,教学法,课堂管理和职业咨询等课程的学习。
Courses for a degree in this field include teaching strategies, curriculum design, teaching technology in the classroom, classroom management, and career counseling.
您可以调整ADCS服务器的策略模块,以允许自动批准的所有证书中的设置,但这不是一个好主意。
You can adjust a setting in the AD CS server's Policy Module to allow automatic approval of all certificates, but that's not a great idea.
最后基于策略计算协议和属性相等测试协议提出了策略和证书的隐私保护协议。
Based on the two protocols, a privacy preserving protocol is proposed for the access control policies and credentials.
指定您的企业服务器许可方证书吊销策略。
Specify your enterprise server licensor certificate revocation policy.
访问决策子系统负责解析用户属性证书和提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制。
It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.
访问决策子系统负责解析用户属性证书和提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制。
It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.
应用推荐