• Multicast source authentication has been regarded as one of a base security issues in multicast technology.

    认证安全组播要解决重要问题之一

    youdao

  • The issue of multicast security consists of data confidentiality, group management, data source authentication and so on.

    安全问题包括:数据保密、组管理访问控制、认证等多个方面。

    youdao

  • In the paper, cipher algorithm is not only used to implement encryption and decryption but also used to source authentication.

    密码算法本文中不仅用作实现加密解密而且用于实现身份的认证。

    youdao

  • Source authentication is an important and difficult problem in multicast security, but no approaches can satisfy all applications now.

    通信认证组播安全中的重点难点问题之一目前没有种方法能够满足所有组播应用领域的需求。

    youdao

  • In addition, the proposed scheme also supports source authentication without precluding in-network processing and passive participation.

    此外方案在不排除处理节点被动加入的情况下,支持数据源认证

    youdao

  • Source authentication is the key and difficulty problem through the multicast. And it also become the basis and precondition for realizing the security multicast.

    而组数据源认证又是整个安全组播通信中的重点难点问题也是真正实现安全组播通信基础前提

    youdao

  • The improved TTS key negotiation protocol, with small calculation cost, makes great progress in key verification, data source authentication and resist inners attack.

    改进TTS密钥协商协议很小计算代价使原tts协议密钥证实性、认证同谋破解上有了很大改善。

    youdao

  • We propose a one-time signature scheme with very efficient signing and verifying, and short signatures. Our scheme is well-suited for multicast source authentication.

    这里提出种一次签名方案,它一种对于签名生成签名验证极为高效的方案,而且签名长度很,特别适用于组播通信的数据源认证。

    youdao

  • In view of the above problems, this paper researches and designs two multicast source authentication schemes that are suitable for IP multicast and wireless multicast.

    针对上述问题本文研究设计了两种分别适合IP无线网络组播的认证方案

    youdao

  • When designing practical IP multicast source authentication schemes, qualitative and quantitative analyses can help to choose the scheme which best meets the application...

    设计实用IP组播认证方案时,可以依据定量定性分析的结果,挑选能满足应用需求方案

    youdao

  • One of the main challenges of securing multicast communication is source authentication. It is therefore critical to provide sound security mechanisms for multicast communication.

    安全通信主要挑战之一认证而其关键组播通信提供可靠的安全机制

    youdao

  • The system login uses information such as source ID (SID), domain and system user name for authentication, so it is considered secure.

    系统登录会使用诸如ID安全识别符),系统用户信息进行身份验证,因此认为是安全的。

    youdao

  • If you chose external authentication source in the previous step, you can get by without additional users.

    如果一步选择的是外部认证那么需要有另外的用户就可以继续进行。

    youdao

  • Retrieving data from any given source usually requires some initialization activities, such as connecting to a data source and providing valid authentication information.

    任何给定数据源检索数据通常都需要进行一些初始化活动例如连接数据源提供有效认证信息

    youdao

  • See the Resources section to learn more about code source access control and authentication in JAAS.

    请参阅参考资料部分了解更多关于JAAS代码访问控制认证的信息。

    youdao

  • A J2C Authentication data Entry needs to be created to connect to our data source.

    需要创建J 2 C身份验证数据条目连接我们数据源

    youdao

  • After remote authentication registration, if pass-through is supported for the data source, you can use it to test the connection to that data source.

    远程认证注册后如果数据源的pass -through支持,那么可以测试那个数据源连接

    youdao

  • Add a JAAS Authentication entry to be used for the data source you will next create.

    添加一个下一次创建数据源用到JAASAuthentication条目

    youdao

  • You will add a DB2 data source now and use the JAAS Authentication entry you just created.

    现在添加一个DB 2数据源使用刚才添加JAASAuthentication条目

    youdao

  • We'll talk about where your data, query database, and authentication source should reside for various types of workloads and requirements.

    讨论对于不同类型工作负载需求应该数据查询数据库身份验证驻留在什么地方

    youdao

  • In this case, cas will perform the authentication when the user first visits the portal and requests a restricted application or data source.

    这种情况下用户首次访问门户请求一个受限制应用程序数据源时,CAS执行身份验证。

    youdao

  • The provider simply has to run authentication against the authentication source.

    提供者只需根据身份验证运行身份验证。

    youdao

  • Before we create the data source, we'll create a JAAS authentication entry, which later we'll associate with the data source so that it can log into the database.

    创建数据源之前我们创建JAAS身份验证条目以后我们将使该条目关联到数据源,以便登录数据库。

    youdao

  • As a consequence, architects often intend to also leverage existing security mechanisms such as authentication and authorization of the source systems.

    因此架构师经常希望利用现有安全机制系统的身份验证授权

    youdao

  • For this document we will only discuss the first step of identifying the type of logon data, the rest is specific to the authentication source being supported and hence off topic.

    对于文档我们讨论一步(识别登录数据类型),其他步骤支持身份验证而异,因此超出了范围。

    youdao

  • Source site redirects to the subject using the authentication token.

    站点使用验证标志重定向主体

    youdao

  • When serving a request the authentication provider will reach out to it's authentication source and read information from it to verify the passed identity information.

    在处理请求身份验证提供者访问身份验证从中读取信息检验传递身份信息。

    youdao

  • In addition it provides support for searching entries and is respecting hierarchical structures of the authentication source.

    另外支持搜索条目能适应身份验证层次结构

    youdao

  • The TSP is not a full provider, it does not attach to an authentication source like LDAP, it's merely a proxy to make some SSO token accessible.

    TSP不是完整提供者连接LDAP身份验证,它只是某种SSO令牌变得可访问的代理

    youdao

  • Besides the JDBC provider, data source and JAAS authentication have also been configured through JACL scripts.

    jdbc提供程序之外,数据源JAAS身份验证通过jacl脚本进行配置

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定