我们给出了一些新的模型检测算法,并探讨它们在安全协议验证中的应用。
We presented several new algorithms of model checking epistemic logics, and explore their applications in verifications of security protocols.
协议分析和协议综合是实现协议验证的两种有效途径,前者更为有效和实用。
The analysis and synthesis of protocols are two efficient approaches to verify protocols; the former is more efficient than the latter.
CollaborationUse元素,同端口和角色绑定一起,表现为一个协议验证段。
The CollaborationUse element, together with port and role bindings, represents a contract verification piece.
一个更好的预测和实验的薄膜厚度之间的协议验证在以前的研究中所提出的方法的优越性。
A better agreement between predicted and experimental film thickness verifies the superiority of the proposed method over the prior studies.
机器定理证明在数学定理证明、协议验证、软件和硬件的形式化验证等方面发挥出越来越重要的作用。
It has become more and more important that the application of theorem proving on mathematic theorem proving, protocol verification, hardware verification and software verification.
从主体认证关联、消息间关联和消息内部关联三个角度去刻画协议,提出了基于以上关联特点的协议验证方法。
The verification method was presented based on the above correlation property, which had been used to verify the Woo and Lam authentication Protocol in reverse analysis.
文章介绍了网络协议验证的几种方法,并以KRONOS验证FDDI 协议为例说明了用时间自动机验证协议的方法。
They are very useful in protocol verifications. This paper presents some methods of protocol verification and uses KRONOS to verify FDDI to introduce the method of using timed automata.
他们还负责验证像安全和服务水平协议这样的所有企业级需是否都被满足了。
They are also responsible for validating that all enterprise level requirements like Security and Service level Agreements are met.
对于本文的目标来说,SSL可以认为是一个“附件”,它对底层IP协议进行加密、验证和认证。
For the purpose of this article, SSL can be regarded as an "add-on" that encrypts, validates, and authenticates an underlying IP protocol.
在接收带区外数据的情况下,协议层检查不同的条件,以验证接收的数据是否为带区外数据,然后将其返回到套接字层。
In the case of receiving out-of-band data, the protocol layer checks for different conditions to validate that the received data is OOB, and then returns it to the socket layer.
即使启用了安全性,部署管理器仍然使用未经过身份验证的协议向节点代理发送配置更新。
Even when security is enabled, the deployment manager continues to communicate configuration updates to the node agents using an unauthenticated protocol.
WebSphereTX引擎向更广泛的消息格式和协议提供功能强大的转换和验证功能。
Provides the powerful transformation and validation capabilities of the WebSphere TX engine to a wider range of message formats and protocols.
采用OAuth作为其中一种身份验证协议的Web站点将增强用户的隐私保护和安全性。
A Web site adopting OAuth as one of its authentication protocols will enhance the privacy and security for users.
两对密钥背后的安全机制被称为开放式验证(OAuth)协议(见参考资料)。
The security mechanism behind the two pairs of keys is called the Open Authentication (OAuth) protocol (see Resources).
Kerberos是由麻省理工学院开发的验证协议。
Kerberos is an authentication protocol developed by the Massachusetts Institute of Technology.
不过,Microsoft . NET需要使用SSL相互验证来保护协议消息。
However, Microsoft.net requires the protocol messages to be secured using SSL mutual authentication.
他关注的领域还有通过语义形式和类型检查对安全性协议进行验证。
He is also concerned with the verification of security protocols through semantic formalisms and type checking.
这些协议都已经经过加密,使用的是操作系统身份验证方法。
Both of these protocols are encrypted and use the operating systems method of authentication.
简单身份验证和安全层(SASL)是一种为身份验证协议提供抽象层的API。
Simple authentication and Security layer (SASL) is an API that provides an abstraction layer for authentication protocols.
下面是这个身份验证协议中的主要步骤。
The following are the main steps in the authentication protocol.
存在许多对远程用户进行身份验证的协议,例如来自受信任来源的证书或安全令牌。
There are many protocols for authenticating remote users, such as certificates or security tokens from trusted sources.
传输层协议:该协议提供服务器身份验证、隐私和具有完美转发隐私的完整性。
Transport Layer protocol: This protocol accommodates server authentication, privacy, and integrity with perfect forward privacy.
协议服务提供传输级服务,包括身份验证、文档路由和用于自动化文档互换的边缘服务功能。
Protocol services provide transport level services, including authentication, document routing, and edge service functions for automated document interchange.
这些协议提供机密性、身份验证和消息完整性。
These protocols provide confidentiality, authentication and message integrity.
最终,在目标验证机制和资金监管上没有达成协议。
Finally, there is no agreement on what institutions would verify that targets are being met and supervise the finances.
一些断言指定最终将在网上体现的传统要求和功能(例如,身份验证模式、传输协议选择)。
Some assertions specify traditional requirements and capabilities that will ultimately manifest on the wire (for example, authentication scheme, transport protocol selection).
如果是SOAP服务,使用的是下层传输协议的验证机制(当前实现中是HTTP)。
For SOAP services, authentication for the underlying transport protocol is used (HTTP, in current implementations).
BrowserID基于一种名为邮件验证协议(verified EmailProtocol)的新协议。
BrowserID is based on a new protocol called Verified Email protocol.
第二人生提供了LDAP(轻量级目录访问协议)整合功能,用于账户创建和验证。
Second Life Enterprise provides LDAP integration for creating and authenticating accounts.
第二人生提供了LDAP(轻量级目录访问协议)整合功能,用于账户创建和验证。
Second Life Enterprise provides LDAP integration for creating and authenticating accounts.
应用推荐