Integration between a enterprise CRM system, with well defined authentication and authorisation, and enterprise back office system often follow this model.
具有定义良好的身份验证和授权的企业CRM系统与企业后端办公室系统间的集成通常采用此模型。
Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.
扩充了Equinox安全模型的认证和授权将增强分布式系统的安全性。
This also fit the authentication model for OmniFind much better, because the II CE Single Sign-On system could be leveraged to log on to each collection for us.
这也更适合OmniFind身份验证模型,因为可以利用IICESingle Sign-On系统来登录到各个集合上。
Through appling the password authentication scheme which is proposed in the fourth chapter to unification authentication system, we get a model of unification authentication system.
将第四章提出的基于对称密码的动态口令认证方案应用于统一认证系统中,构建了一个统一认证系统模型。
This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.
文章介绍了对现有信息隐藏系统模型的攻击形式,指出加入认证理论的必要性。
Then, the structure of the authentication system for remote access is put forward in terms of the model.
在参照这个模型的基础上,给出了远程访问中安全认证系统的组成结构。
The model not only realizes key management, encrypted communication, digital signature and identity authentication, but also is fit for network system with real time and large data transfer.
本模型不仅适用于实时的、大数据传输的网络系统,而且实现了密钥管理、加密管理、数字签名以及身份认证等功能。
This model mainly solve Authentication, Nonrepudiation, Privacy and Integrity existed in the current mail system.
该模型主要解决了邮件系统中存在的身份鉴别、防止抵赖、保密性、完整性等安全问题。
This paper presents a model of Internet-based publishing system of papers. And stresses on user authentication mechanism and authentication protocol based on PKI.
提出了一种基于论文发表系统的模型,重点介绍了基于的用户认证机制和协议。
Finally, some initial works of identity authentication based on mouse trajectories are explored, including the construction of dynamic model, system architecture, data acquisition and analysis, etc.
最后,论文对基于鼠标轨迹的身份鉴别方法进行了初步探讨,在建立动态模型、系统设计、数据采集与分析等方面做了一些初步工作。
The fourth chapter gives the security model in the network exam system, designs and implements the core algorithm of OTP, soft token and OTP authentication server.
第四章给出了网络考试系统安全模型,设计并实现了OTP核心算法、软令牌以及OTP认证服务器。
The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.
在网络拓扑上主要采用DMZ管理区模式,通过SSL认证系统加强网络信息安全防护。
The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.
在网络拓扑上主要采用DMZ管理区模式,通过SSL认证系统加强网络信息安全防护。
应用推荐