网络管理存在的安全问题包括加密验证、身份认证和访问控制等。
The security problem of network management includes encryption, authentication and access control.
SpringSecurity是功能强大的并高度可定制的认证和访问控制框架。
Spring Security is a powerful and highly customizable authentication and access-control framework.
在P 2 P网络中应用门限DSA算法,提出一种适应网络动态性强等特点的节点认证和访问控制方案。
This paper proposes a authentication and access control scheme which USES modified threshold DSA algorithm in P2P network.
从身份认证和访问控制入手,结合PKI和RBAC技术,提出了一种针对电子病历的基于身份的授权模型。
An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
请参阅参考资料部分以了解更多关于JAAS中代码源访问控制和认证的信息。
See the Resources section to learn more about code source access control and authentication in JAAS.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
JAAS提供了对用户进行认证和控制访问资源的模块化机制。
JAAS provides a modular mechanism for authenticating users and controlling access to resources.
该原型系统实现了安全构件的关键部分:认证服务器、消息安全代理和访问控制器。
The prototype system realizes the key parts of the secure component: authentication center, message secure proxy and access controler.
安全问题主要包括认证、访问控制、审计、加密、安全通信和不可否认性。
The security issues include authentication, access control, audition, encryption, safe communication, non-repudiation and so on.
由于P 2 P系统具有分布性、开放性等特点,传统的访问控制和认证的方法不能很好地在P 2 P系统中适用。
As P2P system is inherently decentralized and open, some traditional access control and authentication approaches cannot be adapted in P2P system.
具体对身份认证、访问控制、权限管理、日志审计、数据加密、数字签名等方面进行了研究和一定程度的实现。
The facets of customer verification, access control, authority management, log audit, data encryption, digital signature are researched and implemented to some extent.
并由此确定了认证、访问控制和信息传输安全三项信息安全机制作为信息系统安全的基本要素。
Under the framework, three mechanisms, authentication, access control and information transmission safety, are identified as the essential elements.
信息系统中的安全性问题主要包含身份认证服务、访问控制服务、数据保密服务、数据完整牲服务和不可否认服务等几个方面。
The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.
系统组件由授权管理系统、身份认证服务器和访问控制服务器三大部分组成。
System component includes authorization management system, identification authentication server and access control server.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
近几年产生的基于数字证书的认证和基于角色的访问控制具有安全性高、管理灵活的特征,对于加强系统的安全性很有应用前景。
Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.
身份认证是一个完善的安全系统的重要组成部分,是第一道安全屏障,它是安全通信和访问控制的基础。
Identity authentication is an important part of a perfect secure system, the first defense, and the foundation of secure communication and access control.
本文从身份认证、访问控制等方面对信息安全的相关技术进行了分析和研究。
The thesis researches on the identity authentication and access control in information security technology.
组播安全问题包括:数据保密、组管理和访问控制、源认证等多个方面。
The issue of multicast security consists of data confidentiality, group management, data source authentication and so on.
这两种技术在单点访问系统中实现身份认证和访问授权控制功能。
The PKI and PMI can provide functions of authentication and authority in the SAS.
对于信息系统的安全性一般包括:数据完整性、数据保密性、身份确认和认证、访问控制、不可否认性等几个方面。
The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.
基本认证和HTTP认证提供了对受保护资源的访问控制策略,而SSL则提供对敏感数据加密传输的机制。
The basic authority and the HTTP authority provide access control strategy of the protected resources. The SSL provides mechanism for transmitting sensitive encrypted data.
认证、授权和计费(AAA)协议,如TACACS和RADIUS,当初是为了对终端访问服务和PPP拨号服务实行访问控制而开发的。
Authentication, Authorization and Accounting (AAA) protocols such as TACACS and RADIUS were initially deployed to provide dial-up PPP and terminal server access.
当前一些大型网络数据库管理系统(DBMS)的安全性方法主要包括:身份认证、访问控制、审计跟踪和数据备份,但对一些更为敏感和重要的数据,还需要进行数据加密或者容灾系统的设计。
The major Security methods in DBMS are as follows: identification, visiting control, trace of audit and copy of database, but as to the sensitive and important database, it needs to be coded.
本文通过对SSL及其关键技术的研究,提出了在网络数据库系统的用户访问控制中使用基于SSL和证书的双向身份认证。
Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.
本文通过对SSL及其关键技术的研究,提出了在网络数据库系统的用户访问控制中使用基于SSL和证书的双向身份认证。
Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.
应用推荐