• The protocol USES such technologies as symmetrical key encryption, public key encryption, Hasche algorithm, digital signature as well as public key authorization mechanism and so on.

    协议采用技术包括,对称密钥加密公共密钥加密、算法数字签名技术以及公共密钥授权机制

    youdao

  • The ability to produceand manipulatetables of this sort is a key capability for any authorization framework.

    能够生成此类对这些表进行操作对于任何授权框架来说都是一项关键功能

    youdao

  • Thus, establishing robust identity management processes to achieve authentication and authorization is one of the key aspects to successfully compile a secure software solution.

    因此必须建立健壮身份管理过程实现身份验证授权,这成功实现安全的软件解决方案的关键因素之一

    youdao

  • The ability to do end-to-end authentication and authorization is key to doing real distributed, multi-org composite apps.

    有能力完成端到端的认证授权进行真正的分布式、跨组织组合应用关键所在

    youdao

  • Step 5: Create an instance of the XKMSRegister object by providing the XKMS key data and authorization information.

    步骤5通过提供XKMS密钥数据授权信息创建XKMSRegister对象一个实例

    youdao

  • Enter your Google authorization key and the phrase that you want to spell-check.

    输入Google授权号,以及要拼写检查短语

    youdao

  • Step 4: Specify the registration authorization data required for XKMS key registrations. There are two ways to provide the authorization information.

    步骤4指定XKMS密钥注册所需注册授权数据

    youdao

  • By requiring that a form submission contains a valid authorization key before processing, you make it much more difficult for someone to forge a form submission for another user.

    通过要求表单提交包含有效认证密钥然后才能处理可以使攻击者更难伪造其他用户提交表单。

    youdao

  • Where did that Basic Authorization key come from?

    哪里基本授权钥匙何而来

    youdao

  • Management second key lies in: Understands authorization, academic society supervises very many bosses or high-level superintendent, actually itself certainly does not have the good PM quality.

    管理第二个重点在于懂得授权学会监督很多老板或者高级管理者其实本身没有好的PM素质。

    youdao

  • Moreover, RIDEA strengthens its place as an important core-materials/solution vendor in smart electronics through authorization of patent/proprietarytechnology development of key equipment.

    此外,公司还通过专利专有技术授权关键设备开发,确立智能终端市场核心材料及解决方案重要供应商地位

    youdao

  • Security is one of the key factors in Grid environment. The Grid security include data integrity, data privacy, authentication, authorization and audit.

    安全性网格环境中的关键因素之一,网格安全性主要包括数据一致性私有性认证授权审计

    youdao

  • Software system modeling is another key content of this dissertation, which incarnates the explicit authorization mechanism completely and definitely.

    软件系统建模一部分重点内容更加完整明确地体现显式授权机制的应用。

    youdao

  • Attestation technology is the key to security system of e-business. Attestation technology includes attest right authorization institute, SET model, digit certificate, etc.

    电子商务安全系统关键认证技术。认证技术包括认证授权机构SET模式数字证书等。

    youdao

  • A user could access to trusted services in trusted computing platform only if he was authorized. So authorization is a key process to achieve trusted for platform.

    用户获取可信功能必须通过平台授权认证,因此授权认证实现平台可信一个关键环节

    youdao

  • For example, a technician servicing ATMs can carry a single key, obtaining authorization for each location upon arriving there.

    例如技术人员维修自动柜员机可以携带单一到达一个位置获取授权

    youdao

  • Provides authorization utilities to support specific Web-application configuration, assembly registration, and assembly-key container manipulation.

    允许系统根据提供的参数,执行组态区段组件容器特殊管理

    youdao

  • Provides authorization utilities to support specific Web-application configuration, assembly registration, and assembly-key container manipulation.

    允许系统根据提供的参数,执行组态区段组件容器特殊管理

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定