• End-to-end authentication, confidentiality and Integrity required.

    端到端身份验证需要机密性完整性

    youdao

  • The ability to do end-to-end authentication and authorization is key to doing real distributed, multi-org composite apps.

    有能力完成端到端的认证授权进行真正的分布式、跨组织组合应用关键所在

    youdao

  • In PPP also defines a scalable LCP to allow consultations authentication protocol, thereby conducting transmission network layer protocol before the end-to-end authentication.

    PPP定义了一种可扩展LCP允许协商认证协议从而可以进行网络协议传输之前对对端进行认证。

    youdao

  • When considering end user authentication in an MDM architecture, keep in mind the following.

    一个MD m架构中考虑终端用户认证时,要记住以下几点。

    youdao

  • Authentication specific modules (the back-end).

    身份验证特有的模块(端)。

    youdao

  • At one end of the spectrum lies anonymity, or lack of authentication: we don't know who you are and we don't care.

    范围下面是匿名访问,或者没有任何身份验证:我们无法了解的身份,并且我们对此并不在意

    youdao

  • However, active credentials can submit credentials to back-end applications using standard authentications, such as HTTP form-based authentication or basic authentication.

    不过主动凭证可以使用标准认证(基于HTTP表单的认证基本认证)向后应用程序提交凭证。

    youdao

  • The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.

    可信主机身份验证公私ssh密钥对身份验证方法类似的很大程度上实现相同结果

    youdao

  • Until the connection is re-established, the end users receives error codes indicating that authentication requests failed.

    连接重新建立之前最终用户会收到表示身份验证请求失败错误

    youdao

  • The LDAP authentication provider handles all communication with your back-end LDAP directory.

    LDAP身份验证提供者处理所有端ldap目录的通信

    youdao

  • The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.

    NFSRPC请求可以使用密码认证能力提供了端到端的NFS安全支持

    youdao

  • When a user requests a protected resource but has not yet authenticated (or their authentication session has expired), the initial request does not reach the back-end servers.

    还没有经过身份验证(或者身份验证会话已经过期)的用户请求保护的资源时,最初请求不会到达后端服务器。

    youdao

  • To this end, the Samba developers provide authentication keys you can use to validate your download.

    为此Samba开发人员提供认证密钥可以用来验证下载

    youdao

  • Upon successful authentication of the end user, WebSEAL creates the LTPA Token cookie.

    一旦终端用户认证成功WebSEAL将创建LTPA令牌cookie

    youdao

  • Rather than forcing your end users to create yet another username and password combination that they will surely forget, authentication is delegated to the OpenID provider of their choice.

    最终用户不需要创建一个用户密码组合(他们肯定遗忘),身份验证委托给他们选择OpenID提供商。

    youdao

  • Traditionally, Web sites have maintained their own authentication systems internallyincluding providing a user registry to store the end user’s digital identity.

    过去Web站点常常在内部维护自己身份验证系统包括提供一个用户注册表存储最终用户的数字身份

    youdao

  • It also provides end-to-end support for common tasks such as data validation, authentication and roles by integrating with Silverlight components on the client and ASP.NET on the mid-tier.

    而且通过客户端的Silverlight组件中间层ASP.NET集成起来,提供了常见任务的端到端支持数据验证身份验证角色授权。

    youdao

  • As a result, you can achieve end-to-end identity assertion in a trusted environment with or without re-authentication.

    由此可以可信环境中实现端到端的身份断言(identityassertion),不一定需要重新验证。

    youdao

  • JXTA also has support in the authentication and authorization areas providing end-to-end application security. The authors also commented on the reliable multicast feature in JGroups framework.

    JXTA支持认证授权提供了端到端的安全性

    youdao

  • At end of the paper, the realization of real time encryption and authentication system suitable to wireless monitoring system is introduced according to the character of system and data.

    根据无线监控调度系统系统特点传输数据特点,给出了适用于无线监控调度系统的实时加密认证系统的实现

    youdao

  • Authentication is the process of proving an association or identity between an agent (the end-user in our case) and a defined degree of trust.

    认证证明关联识别过程,关联识别发生代理人(最终用户在我们这里的情况下)和定义信任的程度之间

    youdao

  • For example, when a mobile device client requests access to a back-end application, it sends authentication information to the issuing authority.

    例如移动设备客户机请求访问后端应用程序时,发行认证机构发送认证信息

    youdao

  • This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.

    本文描述AT M网络中的信息安全可能受到的威胁、安全结构系统之间鉴别技术

    youdao

  • Secure e-authentication systems must have a legal framework for cross-border recognition and interoperability by the end of 2011.

    安全的电子认证系统必须在2011年年底前进行跨边界承认互操作性法律框架

    youdao

  • The TETRA system also supports powerful DMO mode and enables authentication, air interface encryption and end-to-end encryption.

    支持功能强大移动台脱网直通(DMO方式可实现鉴权、空中接口加密端对端加密;

    youdao

  • With this scheme, trustworthy user authentication can be achieved and the end - to - end communications will be kept secure and privacy at the same time.

    方案提供可靠身份认证的同时,也保证了移动终端间通讯保密性安全性

    youdao

  • At the end of this paper, we provide the implement of the logistics information system and the progress of the identity authentication.

    最后,根据前述分析给出信息系统实现方法,以及安全身份认证的实现过程

    youdao

  • At the end of this paper, we provide the implement of the logistics information system and the progress of the identity authentication.

    最后,根据前述分析给出信息系统实现方法,以及安全身份认证的实现过程

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定