浏览器显示一个警告,表明安全证书没有经过可信权威认证,与实际网站不匹配。
The browser shows a warning that the security certificate was not certified by a trusted authority and not matching the actual website.
这个安全框架让NFSv4可以提供服务器与客户机之间的认证、完整性和隐私机制。
This security framework allows NFSv4 to provide mechanisms for authentication, integrity, and privacy between clients and servers.
其安全模型与本地模型完全兼容,但限制于标准的SQL认证与登录上。
The security model is 100% compatible with on-premise model but is limited to standard SQL authentication and logins.
ipsec为ipv 6提供了与IPv4的相同级别的认证和安全。
IPSec for IPv6 provides the same level of authentication and security as it does for IPv4.
该套程序一共会向用户显示四组身份识别码,虽然完成全部认证需时约二十八秒,但与只显示一组识别码比起来,四组的安全度更高。
The program shows the user four sets of PINs, which takes about 28 seconds to complete, but ensures a higher level of security than just showing one set.
使用多种形式的认证来简化应用程序整合,同时促进授信事业伙伴与企业部门之间的安全资讯共用。
Simplifies application integration using multiple forms of credentials, and facilitates secure information sharing across trusted business partners and divisions within an enterprise.
注意:如果您想访问需要认证的资源,那么您可以指定第二个与安全性限制相关联的servlet映射。
Note: if you need to access resources that require authentication, you can specify a second servlet mapping that is associated with a security constraint.
他们还应该考虑双重认证,用不断变化的代码将口令与安全键码结合起来。
They should also consider two-part authentication, which can combine passwords with a security key with a changing code.
身份认证与访问控制是信息系统防御主动攻击的主要安全机制。
Identity authentication and access control are the major security mechanisms to defend active attack.
对于大型ECM 部署,安全和权限管理将成为焦点,用户将要求 ECM 产品能很好地同他们企业现有的身份认证与权限管理机制集成。
Security and Information Rights Management will become areas of key focus for those managing large ECM implementations.
认证与授权技术是网格安全的核心,在保证网格安全通信中起到了至关重要的作用。
Authentication and authorization are the core technology of grid security and have the important function for the safe grid communication.
详细的论述了OAM安全认证系统的设计与实现。
Detailedly discuss the design and realization of OAM security authentication system.
各子系统与安全管理中心之间的通信采用了加密、签名、认证等安全机制。
The communication between each subsystem and the security management center integrates many kinds of network security mechanisms such as encryption, signature, authentication etc.
提供质量,健康与安全,环境,社会责任领域的检验,测试及认证服务。
Provide inspection, testing and certification services in the areas of Quality, Health & Safety, Environment and Social Accountability.
该材料热力学性能、耐热老化性能(RTI)的研究及SGS环境安全认证与应用表明,其具有较好的应用发展前景。
The results of thermal mechanical properties, anti-aging property (RTI value) and SGS certification on environment safety showed that the materials had wonderful application prospect.
此外,文中以公钥与单钥算法相结合的方式来确保数据的安全传输和认证。
In addition, public key and symmetric key operations are employed simultaneously to ensure the secure transmission and authentication of data.
TLS协议(传输层安全)能够在客户机与服务器之间认证,建立加密连接。
TLS ( Transport Layer Security) is capable of authenticating both the client and the server and creating a encrypted connection between the two.
本论文主要完成了以下工作:(1)指纹技术与电子商务安全认证的理论分析。
The main thesis completed the following work: 1. Fingerprint technology and e-commerce security certification of the theoretical analysis.
照明电器与电气装置等多个系列上千个品种,产品通过CCC安全认证。
Lighting and electrical installation and many other series of thousands of varieties, the product safety certification through the CCC.
安全与用户认证。
提出了一种新的身份认证与密钥协商协议,该协议可以实现通信双方的相互认证,并通过协商产生安全的会话密钥。
This paper proposed a new authentication and key agreement protocol which can realize mutual authentication and generate a secure session key agreed by both sides of communication.
本文提出了一种将PK I技术与RBAC技术相结合的方案,实现了基于身份认证的安全访问控制。
This paper has presented a scenario that using PKI technology to RBAC and implicating the PKI makes security authorized access control.
与传统移动通信身份认证方法的比较,该方法提高了移动通信中安全性和保密性。
Compared with traditional authentication mechanism, this method improves the security and confidentiality in the mobile communication.
针对BAN逻辑的局限性,在BSW逻辑的基础上,提出了一种针对认证安全性的分析与设计逻辑。
To improve the BAN (Burrows, Abadi & Needham)logic, an analysis and design logic for authentication security was proposed based on the BSW (Buttyan, Staamann & Wilhelm) logic.
现有的SSLVPN技术缺少集中的安全管理机制,认证与访问控制功能也比较单一,无法满足这种复杂的网络应用。
SSL VPN technologies in being lack the central management mechanism. The authentication and authorization functions are simplex, which can't meet the needs of complex network applications.
本文分析了IMS认证与密钥分配协议的过程,找出了认证协议中的安全缺陷,并给出了攻击者可能进行的攻击。
In this paper, an analysis of the procedure and security of IMS (Internet protocol multimedia subsystem) authentication and key agreement protocol has been made.
我并没有替我职业的本质打广告,也没有寻找我行动的认证,我自愿接受这样危险的工作作为我的职业,我必须视其他人的幸福与安全比自己重要。
I do not advertise the nature of my work, nor seek recognition for my actions. I voluntarily accept the inherent hazards of my profession, placing the welfare and security of others before my own.
将用于认证与授权的位置信息添加到现有无线安全性机制,是信息保证的增值提议。
Adding location information for authentication and authorization to the existing wireless security mechanisms is a value-added proposition for information assurance.
将用于认证与授权的位置信息添加到现有无线安全性机制,是信息保证的增值提议。
Adding location information for authentication and authorization to the existing wireless security mechanisms is a value-added proposition for information assurance.
应用推荐