The full capabilities of authentication and access control are beyond the scope of this article.
身份验证和访问控制的完整功能超出了本文的范围。
The security problem of network management includes encryption, authentication and access control.
网络管理存在的安全问题包括加密验证、身份认证和访问控制等。
Identity authentication and access control are the major security mechanisms to defend active attack.
身份认证与访问控制是信息系统防御主动攻击的主要安全机制。
The essential security technologies of the distributed database are user authentication and access control.
分布式数据库安全的核心技术是用户身份验证和访问控制。
The thesis researches on the identity authentication and access control in information security technology.
本文从身份认证、访问控制等方面对信息安全的相关技术进行了分析和研究。
This paper proposes a authentication and access control scheme which USES modified threshold DSA algorithm in P2P network.
在P 2 P网络中应用门限DSA算法,提出一种适应网络动态性强等特点的节点认证和访问控制方案。
With version 3, considered the current version since 2004, the standard was improved with explicit authentication and access control systems.
对于版本3(自从2004年以来的最新版本),该标准已通过显式身份验证和访问控制系统进行了改进。
The framework also exposes a powerful user authentication and access control subsystem that you can customize it to meet the requirements of almost any Web application.
该框架还公开一个强大的用户身份验证和访问控制系统,通过定制它几乎可以满足任意web应用程序的需求。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
The structure of the system, mail service protocols, mode of messaging, allocation of mailboxes as well as personal security for authentication and access control measures are discussed in this paper.
文中论述了该系统的结构、邮递服务协议、邮递方式、信箱的管理及信件的保密和存取控制手段等问题。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
See the Resources section to learn more about code source access control and authentication in JAAS.
请参阅参考资料部分以了解更多关于JAAS中代码源访问控制和认证的信息。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.
它们有很多相同的概念,要处理的问题域也在很大程度上重叠:验证、授权和访问控制。
Spring Security is a powerful and highly customizable authentication and access-control framework.
SpringSecurity是功能强大的并高度可定制的认证和访问控制框架。
Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
One of the major features of NFS Version 4 is its support for enhanced security schemes, which allow stronger authentication, fine-grained access control, and encrypted data traffic.
NFSVersion4的主要特性之一就是它对增强型安全方案的支持,该方案允许更强的身份验证、细粒度的访问控制以及加密的数据通信。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
This approach obviously offers more precise control than the simple password-based authentication shown earlier, and is recommended for applications that require multiple levels of access control.
这种方法显然比前面显示的基于密码的方法提供更加精确的访问,并且推荐需要多级访问控制的应用程序使用该方法。
Computer security involved many aspects including encryption, authentication, and access control and inspecting of inbreak.
数据库安全涉及加密、认证、访问控制、入侵检测等多个方面。
Longitudinal authentication: authentication, encryption, access control and other means to achieve the safe transmission of data and the security of the vertical sector.
纵向认证:采用认证、加密、访问控制等手段实现数据的安全传输以及纵向界的安全防护。
The security issues include authentication, access control, audition, encryption, safe communication, non-repudiation and so on.
安全问题主要包括认证、访问控制、审计、加密、安全通信和不可否认性。
This paper introduces commonly used methods of ID Authentication in a campus network and finds a common problem that it is difficult to control access unauthorized within the broadcast domain.
介绍了常见的园区网用户身份认证方法,并指出它们普遍存在的一个问题:在一个广播域内非法接入难以控制。
At last, it achieved user authentication access control system on the foundation of scheme design, and constructing experiment platform combining RADIUS authentication server.
最后,在方案设计基础上实现本认证与访问控制系统,结合RADIUS认证服务器构建实验系统平台。
As P2P system is inherently decentralized and open, some traditional access control and authentication approaches cannot be adapted in P2P system.
由于P 2 P系统具有分布性、开放性等特点,传统的访问控制和认证的方法不能很好地在P 2 P系统中适用。
Under the framework, three mechanisms, authentication, access control and information transmission safety, are identified as the essential elements.
并由此确定了认证、访问控制和信息传输安全三项信息安全机制作为信息系统安全的基本要素。
Under the framework, three mechanisms, authentication, access control and information transmission safety, are identified as the essential elements.
并由此确定了认证、访问控制和信息传输安全三项信息安全机制作为信息系统安全的基本要素。
应用推荐