The protocol USES such technologies as symmetrical key encryption, public key encryption, Hasche algorithm, digital signature as well as public key authorization mechanism and so on.
该协议采用的技术包括,对称密钥加密、公共密钥加密、哈希算法、数字签名技术以及公共密钥授权机制等。
The ability to produce — and manipulate — tables of this sort is a key capability for any authorization framework.
能够生成此类表并对这些表进行操作对于任何授权框架来说都是一项关键功能。
Thus, establishing robust identity management processes to achieve authentication and authorization is one of the key aspects to successfully compile a secure software solution.
因此,必须建立健壮的身份管理过程来实现身份验证和授权,这是成功实现安全的软件解决方案的关键因素之一。
The ability to do end-to-end authentication and authorization is key to doing real distributed, multi-org composite apps.
有能力完成端到端的认证和授权是进行真正的分布式、跨组织组合应用的关键所在。
Step 5: Create an instance of the XKMSRegister object by providing the XKMS key data and authorization information.
步骤5:通过提供XKMS密钥数据和授权信息,创建XKMSRegister对象的一个实例。
Enter your Google authorization key and the phrase that you want to spell-check.
输入您的Google授权号,以及您想要拼写检查的短语。
Step 4: Specify the registration authorization data required for XKMS key registrations. There are two ways to provide the authorization information.
步骤4:指定XKMS密钥注册所需的注册授权数据。
By requiring that a form submission contains a valid authorization key before processing, you make it much more difficult for someone to forge a form submission for another user.
通过要求表单提交包含有效的认证密钥,然后才能处理,可以使攻击者更难伪造其他用户提交的表单。
Where did that Basic Authorization key come from?
在哪里是基本授权钥匙从何而来?
Management second key lies in: Understands authorization, academic society supervises very many bosses or high-level superintendent, actually itself certainly does not have the good PM quality.
管理的第二个重点在于:懂得授权,学会监督很多老板或者高级管理者,其实本身并没有好的PM素质。
Moreover, RIDEA strengthens its place as an important core-materials/solution vendor in smart electronics through authorization of patent/proprietarytechnology development of key equipment.
此外,公司还通过专利或专有技术授权和关键设备的开发,确立在智能终端市场核心材料及解决方案的重要供应商地位。
Security is one of the key factors in Grid environment. The Grid security include data integrity, data privacy, authentication, authorization and audit.
安全性是网格环境中的关键因素之一,网格的安全性主要包括数据的一致性、私有性、认证、授权与审计。
Software system modeling is another key content of this dissertation, which incarnates the explicit authorization mechanism completely and definitely.
软件系统的建模是这一部分的重点内容,它更加完整明确地体现了显式授权机制的应用。
Attestation technology is the key to security system of e-business. Attestation technology includes attest right authorization institute, SET model, digit certificate, etc.
电子商务安全系统的关键是认证技术。认证技术包括认证授权机构、SET模式、数字证书等。
A user could access to trusted services in trusted computing platform only if he was authorized. So authorization is a key process to achieve trusted for platform.
用户获取可信功能必须通过平台的授权认证,因此授权认证是实现平台可信的一个关键环节。
For example, a technician servicing ATMs can carry a single key, obtaining authorization for each location upon arriving there.
例如,技术人员维修自动柜员机可以携带一个单一的锁,每到达一个位置后获取授权。
Provides authorization utilities to support specific Web-application configuration, assembly registration, and assembly-key container manipulation.
允许系统根据提供的参数,执行组态区段和组件金钥容器的特殊管理。
Provides authorization utilities to support specific Web-application configuration, assembly registration, and assembly-key container manipulation.
允许系统根据提供的参数,执行组态区段和组件金钥容器的特殊管理。
应用推荐