Multicast source authentication has been regarded as one of a base security issues in multicast technology.
组播源认证是安全组播要解决的重要问题之一。
The issue of multicast security consists of data confidentiality, group management, data source authentication and so on.
组播安全问题包括:数据保密、组管理和访问控制、源认证等多个方面。
In the paper, cipher algorithm is not only used to implement encryption and decryption but also used to source authentication.
密码算法在本文中不仅被用作实现加密解密,而且被用于实现身份的认证。
Source authentication is an important and difficult problem in multicast security, but no approaches can satisfy all applications now.
组播通信源认证是组播安全中的重点和难点问题之一,但目前没有一种方法能够满足所有组播应用领域的需求。
In addition, the proposed scheme also supports source authentication without precluding in-network processing and passive participation.
此外,本方案在不排除网内处理和节点被动加入的情况下,支持数据源认证。
Source authentication is the key and difficulty problem through the multicast. And it also become the basis and precondition for realizing the security multicast.
而组播数据源认证又是整个安全组播通信中的重点和难点问题,也是真正实现安全组播通信的基础和前提。
The improved TTS key negotiation protocol, with small calculation cost, makes great progress in key verification, data source authentication and resist inners attack.
改进的TTS密钥协商协议,以很小的计算代价使原tts协议在密钥证实性、源认证和抗同谋破解上有了很大改善。
We propose a one-time signature scheme with very efficient signing and verifying, and short signatures. Our scheme is well-suited for multicast source authentication.
这里提出了一种一次签名方案,它是一种对于签名生成和签名验证都极为高效的方案,而且签名长度很短,特别适用于组播通信的数据源认证。
In view of the above problems, this paper researches and designs two multicast source authentication schemes that are suitable for IP multicast and wireless multicast.
针对上述问题,本文研究和设计了两种分别适合于IP组播和无线网络组播的源认证方案。
When designing practical IP multicast source authentication schemes, qualitative and quantitative analyses can help to choose the scheme which best meets the application...
在设计实用的IP组播源认证方案时,可以依据定量及定性分析的结果,挑选最能满足应用需求的方案。
One of the main challenges of securing multicast communication is source authentication. It is therefore critical to provide sound security mechanisms for multicast communication.
安全组播通信的主要挑战之一是源认证,而其关键是为组播通信提供可靠的安全机制。
The system login uses information such as source ID (SID), domain and system user name for authentication, so it is considered secure.
系统登录会使用到诸如源ID(安全识别符),域和系统用户名等信息进行身份验证,因此被认为是安全的。
If you chose external authentication source in the previous step, you can get by without additional users.
如果在上一步您选择的是外部认证源,那么不需要有另外的用户就可以继续进行。
Retrieving data from any given source usually requires some initialization activities, such as connecting to a data source and providing valid authentication information.
从任何给定的数据源检索数据通常都需要进行一些初始化活动,例如连接到数据源和提供有效的认证信息。
See the Resources section to learn more about code source access control and authentication in JAAS.
请参阅参考资料部分以了解更多关于JAAS中代码源访问控制和认证的信息。
A J2C Authentication data Entry needs to be created to connect to our data source.
需要创建J 2 C身份验证数据条目以连接到我们的数据源。
After remote authentication registration, if pass-through is supported for the data source, you can use it to test the connection to that data source.
在远程认证注册后,如果数据源的pass -through受支持,那么可以用它来测试到那个数据源的连接。
Add a JAAS Authentication entry to be used for the data source you will next create.
添加一个下一次创建数据源时将用到的JAASAuthentication条目。
You will add a DB2 data source now and use the JAAS Authentication entry you just created.
现在要添加一个DB 2数据源,并使用刚才添加的JAASAuthentication条目。
We'll talk about where your data, query database, and authentication source should reside for various types of workloads and requirements.
讨论对于不同类型的工作负载和需求,应该把数据、查询数据库和身份验证源驻留在什么地方。
In this case, cas will perform the authentication when the user first visits the portal and requests a restricted application or data source.
在这种情况下,当用户首次访问门户并请求一个受限制的应用程序或数据源时,CAS将执行身份验证。
The provider simply has to run authentication against the authentication source.
提供者只需根据身份验证源运行身份验证。
Before we create the data source, we'll create a JAAS authentication entry, which later we'll associate with the data source so that it can log into the database.
在创建数据源之前,我们将创建JAAS身份验证条目,以后我们将使该条目关联到数据源,以便登录数据库。
As a consequence, architects often intend to also leverage existing security mechanisms such as authentication and authorization of the source systems.
因此,架构师经常还希望利用现有的安全机制,如源系统的身份验证和授权。
For this document we will only discuss the first step of identifying the type of logon data, the rest is specific to the authentication source being supported and hence off topic.
对于本文档,我们只讨论第一步(识别登录数据的类型),其他步骤因支持的身份验证源而异,因此超出了范围。
Source site redirects to the subject using the authentication token.
源站点使用验证标志重定向主体。
When serving a request the authentication provider will reach out to it's authentication source and read information from it to verify the passed identity information.
在处理请求时,身份验证提供者会访问它的身份验证源,从中读取信息以检验传递的身份信息。
In addition it provides support for searching entries and is respecting hierarchical structures of the authentication source.
另外,它支持搜索条目并能适应身份验证源的层次结构。
The TSP is not a full provider, it does not attach to an authentication source like LDAP, it's merely a proxy to make some SSO token accessible.
TSP不是完整的提供者,它不连接LDAP等身份验证源,它只是让某种SSO令牌变得可访问的代理。
Besides the JDBC provider, data source and JAAS authentication have also been configured through JACL scripts.
除jdbc提供程序之外,数据源和JAAS身份验证也通过jacl脚本进行配置。
应用推荐