这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
而事实上,证书可能会散放在某人的工作站或移动电脑上,并且提供的物理访问控制非常小,这进一步复杂化了该问题。
This is compounded by the fact that the certificate may be "in the wild" on somebody's workstation or mobile computer with minimal physical access controls.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
如果无法访问iManager控制台,但是需要查明服务器提供的证书,可以采用以下方法。
When there is no access to the IManager console but you need to find out about the certificate the server presents, here is a way.
基于SPKI技术提出了组播分布式访问控制系统MDAC,并提出了基于二叉授权委托树的委托证书路径(DCP)查找算法。
Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path (DCP) searching algorithm based on binary tree.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
为了设计一种交叉域访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户的PK I方法。
In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.
完整设计了模型的整个可实现框架:包括各组成模块的功能、相关数据结构和消息编码格式、证书管理库和密钥环的设计,以及具体的访问控制流程等。
Those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on.
本文通过对SSL及其关键技术的研究,提出了在网络数据库系统的用户访问控制中使用基于SSL和证书的双向身份认证。
Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.
近几年产生的基于数字证书的认证和基于角色的访问控制具有安全性高、管理灵活的特征,对于加强系统的安全性很有应用前景。
Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.
该模型从用户证书、时间约束、XML文档分类等方面对传统的RBAC模型进行了扩展,以实现基于内容的时间上下文敏感的多粒度访问控制。
This model extends the traditional RBAC model with user credentials, temporal constraints and XML document classification to enforce a content-based time-aware multi-granularity access control.
在规划网络时,有必要实施严格的身份认证、访问控制、数据加密、数字签名等服务,逐步普及使用数字证书。
In planning network, it is necessary to implement strict identity approval, visit-controlling, data-encrypting, figurative signature, etc, popularize and use the digital certificates progressively.
采用基于属性证书的RBAC访问控制技术,可以实施更细粒度的访问控制技术。支持DER和PEM格式的数字证书。
Apply RBAC access control technique based on the attribute certificate to gain finer granularity, all with support to DER and PEM format of digital certificate.
提出了一个数字证书营运中的基于任务的访问控制模型,解决了数字证书营运中的安全问题。
In this paper, we develop a task-based access control model for the service of certificate to solve those secure-problems.
它包含一个控制访问对象的安全核心,位于其上的是一些实现基本功能的模块,如加密和数字签名、证书管理、安全会话、数据密封等。
On top of the kernel are some modules which implement basic functions, such as encryption, digital signature, certificate management, secure session and data enveloping.
访问决策子系统负责解析用户属性证书和提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制。
It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.
访问决策子系统负责解析用户属性证书和提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制。
It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.
应用推荐