• This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.

    包括识别认证授权访问控制数据屏蔽审计加密

    youdao

  • They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.

    它们很多相同概念,要处理的问题也在很大程度上重叠:验证授权访问控制。

    youdao

  • Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.

    Realm操作目前所有Realm实现都支持”操作获取验证授权数据执行登录访问控制

    youdao

  • Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.

    使用Acegi安全性可以应用程序提供全面身份验证授权基于实例的访问控制通道安全和人工用户检测功能。

    youdao

  • An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.

    身份认证访问控制入手,结合PKIRBAC技术提出种针对电子病历的基于身份授权模型

    youdao

  • System component includes authorization management system, identification authentication server and access control server.

    系统组件授权管理系统、身份认证服务器访问控制服务器三大部分组成。

    youdao

  • System component includes authorization management system, identification authentication server and access control server.

    系统组件授权管理系统、身份认证服务器访问控制服务器三大部分组成。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定