• Integration between a enterprise CRM system, with well defined authentication and authorisation, and enterprise back office system often follow this model.

    具有定义良好身份验证授权企业CRM系统企业办公室系统集成通常采用模型。

    youdao

  • Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.

    扩充Equinox安全模型认证授权增强分布式系统安全性

    youdao

  • This also fit the authentication model for OmniFind much better, because the II CE Single Sign-On system could be leveraged to log on to each collection for us.

    更适合OmniFind身份验证模型因为可以利用IICESingle Sign-On系统登录各个集合上。

    youdao

  • Through appling the password authentication scheme which is proposed in the fourth chapter to unification authentication system, we get a model of unification authentication system.

    第四提出基于对称密码的动态口令认证方案应用统一认证系统中,构建了一个统一认证系统模型

    youdao

  • This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.

    文章介绍现有信息隐藏系统模型攻击形式指出加入认证理论的必要性

    youdao

  • Then, the structure of the authentication system for remote access is put forward in terms of the model.

    参照这个模型基础上,给出远程访问安全认证系统组成结构

    youdao

  • The model not only realizes key management, encrypted communication, digital signature and identity authentication, but also is fit for network system with real time and large data transfer.

    模型不仅适用实时的、数据传输网络系统而且实现了密钥管理加密管理、数字签名以及身份认证等功能

    youdao

  • This model mainly solve Authentication, Nonrepudiation, Privacy and Integrity existed in the current mail system.

    模型主要解决邮件系统存在身份鉴别、防止抵赖保密性完整性等安全问题。

    youdao

  • This paper presents a model of Internet-based publishing system of papers. And stresses on user authentication mechanism and authentication protocol based on PKI.

    提出一种基于论文发表系统模型重点介绍了基于的用户认证机制协议

    youdao

  • Finally, some initial works of identity authentication based on mouse trajectories are explored, including the construction of dynamic model, system architecture, data acquisition and analysis, etc.

    最后,论文对基于鼠标轨迹身份鉴别方法进行了初步探讨,在建立动态模型系统设计数据采集分析等方面做了一些初步工作

    youdao

  • The fourth chapter gives the security model in the network exam system, designs and implements the core algorithm of OTP, soft token and OTP authentication server.

    第四给出网络考试系统安全模型设计实现了OTP核心算法令牌以及OTP认证服务器

    youdao

  • The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.

    网络拓扑主要采用DMZ管理区模式通过SSL认证系统加强网络信息安全防护。

    youdao

  • The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.

    网络拓扑主要采用DMZ管理区模式通过SSL认证系统加强网络信息安全防护。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定