认证和授权安全。
安全是一个涉及面很广的话题,如认证、授权及信息传输等。
Security is a broad topic that includes authentication, authorization, and information transmission.
安全——认证和授权服务。
但编程方式的安全增强则更有意思一些,login、logout这些方法能让开发人员更好地控制认证和授权过程。
But the more interesting thing is the programmatic security enhancements including the login and logout methods which give the developer more control over the authentication and authorization process.
本文主要关注MDMServer中解决MDMIT安全服务的认证、授权和审计等方面的组件。
This article focuses on the components of MDM Server that address the authentication, authorization, and audit aspects of it security services for MDM.
RationalRapidDeveloper还有一系列安全框架能够帮助你为你的应用程序迅速地开发授权和认证组件。
And Rational Rapid Developer has a set of security frameworks that help you get a quick start on developing the authorization and authentication components of your application as well.
虽然多数安全框架止于授权和认证,但Shiro提供了更多功能。
And while most security frameworks stop at authentication and authorization, Shiro provides much more.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
扩充了Equinox安全模型的认证和授权将增强分布式系统的安全性。
Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.
安全性认定标记语言(Security Assertion Markup Language (saml))是以xml消息传输认证和授权信息的协议。
Security Assertion Markup Language (SAML) is a protocol to transport authentication and authorization information in an XML message.
集成的安全特性包括对认证和授权的支持并与现有的企业安全基础设施相集成。
Integrated security features including authentication and authorization support integrated with existing enterprise security infrastractures
JXTA还支持认证和授权,提供了端到端的安全性。
JXTA also has support in the authentication and authorization areas providing end-to-end application security. The authors also commented on the reliable multicast feature in JGroups framework.
认证与授权技术是网格安全的核心,在保证网格安全通信中起到了至关重要的作用。
Authentication and authorization are the core technology of grid security and have the important function for the safe grid communication.
利用基于JAAS的认证功能和J2EE服务器特有的授权和审计体系,为系统的安全控制提供了保障。
The authentication based on JAAS together with authorization and audit function provided by J2EE application server assure the security control for system.
本文的讨论对象是亚信统一帐号、认证、授权和审计平台(aiuap1.0),是亚信公司对于4A安全系统的具体实现。
This article mainly discussed AIUAP1.0 — the account, authentication, authorization and auditing platform of AsiaInfo company, which is a concrete implementation of 4a security system at AsiaInfo.
该系统实现了远程访问用户的安全认证、访问授权和记费管理。
The system achieves identity authentication, access authorization, and accounting management to the remote access users.
RADIUS协议为远程访问系统提供重要的安全服务,即认证、授权和记账。
RADIUS protocol provides very important services for remote access system, including authentication, authorization and accounting.
可采用单点登陆、PKI认证、授权、基于角色的权限分配策略、利用应用网关访问资源,开发适合本系统的工作流访问机制等措施确保信息平台的安全。
The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.
为了保障主动网络安全,我们需要两个基本服务,即认证和授权。
In order to secure active networks, we need two basic services: authentication and authorization.
另外,用户面对不同的授权服务要重复进行身份认证,操作繁琐,且存在一定的安全隐患。
Moreover, the users must carry on the status authentication for different authorized service, which is tedious and has certain safe hidden trouble.
网络信息安全技术一般包括身份认证、授权控制、审计、数据保密和数据完整性等几个方面。
The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on.
请注意,我不是问其他API安全,认证/授权等。
Please note that I do not ask about REST API security, authentication/authorization etc.
安全服务——主要由认证服务组成,确认人们试图对网站进行的访问是经过授权的。
Security services-these consist mainly of authentication services that verify that the person trying to access the site is authorized to do so.
最后给出了安全IP电话网的设计,通过使用RADIUS认证系统实现用户认证和授权,通过使用IP保密电话机实现数据的安全传送。
In the end, the thesis gives the design of secure IP telephone system, which can authenticate and authorize through RADIUS, transfer data safely through the secrecy IP phone.
为了保证授权过程的安全,设计了一种散列码标识的方案,作为接入点识别移动台的根据,同时采用提前认证等手段提高切换过程的速度。
Hash Marking method was proposed to mark the mobile node and to ensure the security of authorization. In addition, pre-authentication method was used to reduce hand-off time.
将用于认证与授权的位置信息添加到现有无线安全性机制,是信息保证的增值提议。
Adding location information for authentication and authorization to the existing wireless security mechanisms is a value-added proposition for information assurance.
将用于认证与授权的位置信息添加到现有无线安全性机制,是信息保证的增值提议。
Adding location information for authentication and authorization to the existing wireless security mechanisms is a value-added proposition for information assurance.
应用推荐