认证模型的最后一部分是用户库。
The last component of the authentication model is the user repository.
该文提出了电力生产对象运行维护自动化中的一种签名认证模型。
This paper presents a signature recognition model for the maintenance automation of power producing system.
特别需要指出的是,您应该注意一下利用这些服务的各种认证模型与技术选择。
In particular, the variety authentication models and technology choices for leveraging these services deserve your attention.
相反,JAAS的以用户为中心的认证模型是以保护世界不受用户影响的思路开发的。
In contrast, the user-centric authorization model of JAAS was developed with the idea of protecting the world from the user.
这为构建国家级PK I安全认证模型的研究提供了一个有价值的新思路。
It provides a new valuable way of the construction of the national-level PKI secure certification model in the open networks.
在深入研究主动网认证方法的基础上,提出并设计了一个主动网络强认证模型。
Presenting a strong authentication model for ANs after deeply researching the various authentication methods of ANs.
在本导游的最后一程,将介绍JAAS认证模型中的一个矛盾,并且我将描述一个解决它的实际方法。
In this final leg of the tour, you'll learn about a discrepancy in the JAAS authorization model and I'll describe a practical method for addressing it.
现有的网格安全认证模型有集中式层次认证模型、多CA结构的模型和混合交叉认证模型。
Existing Grid security certificate models include: centralized ca (certificate Authority) model, multi-CA model and crossed certificate model.
建立了量子身份认证模型,同时提出了一种基于四粒子ghz态的量子相干性的身份认证方案。
The model of quantum identification was established, and an identification scheme was presented on the basis of the coherency of the four-particle GHZ state.
详细分析设计系统功能,并构建了系统实现安全管理的逻辑模型、拓扑模型以及安全认证模型。
It analyzes and designs the system's function module, moreover constructs the logic model, topology model and safety authentication model.
为了提高用户身份认证的有效性,给出了一个集成肯定认证机制和否定认证机制的双层认证模型。
To improve the validity of user identity authentication mechanism, a two-double authentication model integrating positive authentication mechanism and negative authentication mechanism was given.
针对当前PK I建设中解决“信任孤岛”问题的交叉认证模型,介绍了已存在的证书链构建方法。
Based on the present cross-certification model which aims at resolving the trust islands problem, an existent certificate-path construction method is presented.
本文研究的联合认证模型提供了一个解决方案,实现了支持跨平台、跨网络的企业级应用中的身份管理。
The unite authentication model this paper studied, which provides a solution to achieve cross-platform support to the ID management in inter-network enterprise applications.
仿真实验表明,该身份认证模型能够承受各种口令攻击,有效过滤非法用户的登录请求,具有较好的鲁棒性和可用性。
Simulation tests show that the identity authentication model can stand with password attacks, filtrate out invalid login requests availably, and have advantages of good robustness and reliability.
当一个ASPX请求到达IIS,Web服务器根据认证模型分配一个令牌,该令牌是基于匿名、Windows、基本或分类。
When an ASPX request hits IIS, the Web server assigns a token based on the authentication model of choice-anonymous, Windows, Basic, or Digest.
本文论述了一次性口令认证的基本原理,提出了一种基于信息摘录的认证模型,由此讨论了一次性口令认证在安全系统中的实。
The thesis argues the principle of OTP and studies the implementation of it in security system by introducing an OTP authentication system based on message digest.
本文构建了一种SAN存储网络的安全认证模型,利用SRP机制实现了分布式数据存储的认证,有效地确保了数据的安全性和一致性。
This paper constructed a security authentication mode in IP SAN, realized authentication in distributed data storage using SRP, and assured the security and integrity of data.
为克服传统网络身份认证方法安全性不高、效率低等不足,受人类自然信任原理启发,提出了一种基于家族基因的身份认证模型(FBNA)。
Inspired by the natural trust principle of mankind, a family-gene based model for network authentication, referred to as FBNA, is proposed.
而且,在这个模型中,授权数据已经与认证数据分隔开了,这样,授权数据就应该不用嵌入认证令牌中了。
Also in this model, authorization data has been separated from the authentication information so authorization data should not be embedded in authentication tickets.
美国专利局拒绝评估认证永动装置,除非设计者们能制造出可用的模型。
The U.S. patent office refuses to assess claims for perpetual motion devices unless the inventors can produce working models.
扩充了Equinox安全模型的认证和授权将增强分布式系统的安全性。
Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.
SpringWebFlow能够提供一个JSF平台模型,并提供状态、流和transition的授权,其中,认证和授权的实现应用到了SpringSecurity。
Spring Web Flow provides a JSF platform model and authorization of States, Flows, and Transitions. It USES Spring Security for authentication and authorization purposes.
使用双层模型使我们能继续在我们的主Portal服务器上运行RedHatLinux 8.0,还得到了使用目录服务进行认证的好处。
Using a two-tier model meant we could continue running Red Hat Linux 8.0 on our main Portal server plus gain the benefits of using a directory service for authentication.
当一些组织追求全面质量管理,6希格玛或者能力成熟度模型认证,其它人更喜欢较少使用的非正式的方法。
While some organizations pursue Total Quality Management, Six Sigma, or Capability Maturity Model certification, others prefer a less formalized approach.
其安全模型与本地模型完全兼容,但限制于标准的SQL认证与登录上。
The security model is 100% compatible with on-premise model but is limited to standard SQL authentication and logins.
显然,要使这个模型生效,每个用户都必须经过认证。
Obviously, for this model to work each user must be authenticated.
本文利用空间价格梯度场模型分析了森林认证对关税壁垒的替代效应,并在最后提出了相关建议。
This paper analyzes the substituting effect of forest certification against tariff barriers using a space-price gradient model, and gives Suggestions.
本文利用空间价格梯度场模型分析了森林认证对关税壁垒的替代效应,并在最后提出了相关建议。
This paper analyzes the substituting effect of forest certification against tariff barriers using a space-price gradient model, and gives Suggestions.
应用推荐