Thus, establishing robust identity management processes to achieve authentication and authorization is one of the key aspects to successfully compile a secure software solution.
因此,必须建立健壮的身份管理过程来实现身份验证和授权,这是成功实现安全的软件解决方案的关键因素之一。
In doing so authentication and identity management needs to be addressed.
要完成这些工作,首先要解决的就是认证和身份管理。
All cloud services (and each cloud service's management interface) require mechanisms for identity management, authentication, authorization, and auditing (IAAA).
所有的云服务(以及每个云服务的管理界面)都需要身份管理、认证、授权和审计(IAAA)的机制。
This scheme not only supports secret key management and identity authentication of personnel and equipment, but also constructs secret key management center and manages encrypted key of the system.
方案不仅支持系统内人员和设备的密钥管理、身份认证及公钥密码运算,而且还对加密密钥进行管理。
This system realizes key management, encrypted communication, digital signature and identity authentication etc.
本系统实现了密钥管理、加密管理、数字签名以及身份认证等功能。
The model not only realizes key management, encrypted communication, digital signature and identity authentication, but also is fit for network system with real time and large data transfer.
本模型不仅适用于实时的、大数据传输的网络系统,而且实现了密钥管理、加密管理、数字签名以及身份认证等功能。
At last introduce the implement of integration information main web, user management and identity authentication, network safety of data centre of campus construction.
最后根据上述的校园建设方案从综合信息门户系统、用户管理及身份认证和校园数据中心网络安全三个方面具体介绍了实现过程。
It can effectively solve the problem of key management and allocation of traditional key cryptosystem, digital signatures, identity authentication and so on.
有效解决了常规密码体制中的密钥管理与分配、数字签名、身份认证等问题。
Identity management solutions complement SSO, authentication and access management products by automatically provisioning and deprovisioning IT resources.
身份管理解决方案可以自动提供及取消IT 资源,从而为SSO、验证和访问管理产品起到补充作用。
The system achieves identity authentication, access authorization, and accounting management to the remote access users.
该系统实现了远程访问用户的安全认证、访问授权和记费管理。
The master private key is Shared by the private key of every node. Threshold and identity-based key management and authentication are used.
各节点使用其身份作为公钥,主密钥由各节点的私钥分享,从而形成基于身份的门限分布式密钥管理。
The thesis firstly presents the overall identity authentication system design, including the levels of data acquisition, data preprocessing, data analysis, and user management.
本文首先介绍了基于击键特征的身份鉴别系统的设计,该系统包括数据采集、数据预处理与分析、用户管理等多个层次。
With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.
随着更多的应用系统加入到统一认证服务,本系统将会在教科网的信息安全体系中发挥更重要的作用,而且网络管理更加简单。
With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.
随着更多的应用系统加入到统一认证服务,本系统将会在教科网的信息安全体系中发挥更重要的作用,而且网络管理更加简单。
应用推荐