Authentication is a very key part for network security. So the solution for network security authentication based on EPASS1000 was put forward.
网上身份认证是网络安全的一个关键环节,为此,提出了采用EPASS1000进行网上身份安全认证的解决方案。
Authentication, authorization, privacy, integrity, and non-reputation are the major security components of software or a software-based solution working over the network.
在通过网络运行的软件或软件解决方案中,身份验证、授权、私密性、完整性和不可否认性是主要的安全组件。
To guarantee security of the messages traveling over the network, the client mode must be configured to support SSL and J2C authentication alias.
为了保证在网络上传输的消息的安全,必须将客户机模式配置为支持ssl和j2c身份验证别名。
Most of the solutions exercising multifactor as well as multi-layer authentication make use of the same underlying network security mechanism.
大多数实现多因素身份验证和多层身份验证的解决方案使用相同的底层网络安全机制。
This article discusses the risks associated with systems using the same network security mechanism for multifactor or multi-layer authentication.
本文讨论使用相同的网络安全机制实现多因素或多层身份验证的风险。
Although DB2 provides a sufficient level of security to safeguard the data over the network, it requires administrators to configure the DB2-specific authentication modules.
虽然DB 2提供了足够级别的安全性来确保数据在网络上的安全,但是仍然需要管理员配置DB 2特有的身份验证模块。
Despite its advantages, most of the solutions exercising multifactor as well as multi-layer authentication make use of the same underlying network security mechanisms.
尽管多因素身份验证和多层身份验证是有优势的,但是大多数解决方案使用相同的底层网络安全机制实现它们。
Kerberos is a popular security mechanism used by systems for network authentication and secure transmission of data.
Kerberos是用于网络身份验证和保护数据传输的最流行的安全机制。
Informix integrates operating system security functions for user authentication and network permissions.
Informix集成了操作系统安全性功能来对用户进行身份验证和管理网络权限。
Network file system Version 4 (NFS V4), the up-and-coming enterprise file system, USES the Kerberos security mechanism to address privacy, authentication, and integrity requirements.
即将推出的企业文件系统Net workFileSystemVersion4 (NFSV4)使用Kerberos安全性机制解决隐私、身份验证和完整性需求。
The peer entity authentication is an important service in the network security architecture.
对等实体鉴别服务是网络安全体系结构中的一项重要服务。
A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
The communication between each subsystem and the security management center integrates many kinds of network security mechanisms such as encryption, signature, authentication etc.
各子系统与安全管理中心之间的通信采用了加密、签名、认证等安全机制。
Identity authentication is an important aspect of network security technology and the basis of other security mechanisms.
身份认证是网络安全技术的一个重要方面,是其他安全机制的基础。
Although PKI-based authentication provides better flexibility and security, the computation load is much heavier, also ca servers will become network bottlenecks and attacking targets.
基于PKI的认证方法提供了较好的灵活性和安全性,但计算量较大,CA服务器也易于成为网络瓶颈和攻击目标。
Identification recognition, authentication and digital signature are strong methods of available security theories to secure safe transmission in network environment.
身份识别和认证以及数字签名技术是现有的安全理论中保证网络环境下信息安全传输的有力手段。
Authentication exchange mechanism is a network security mechanism which is to make two principals believe they are communicating with each other by exchanging information.
鉴别交换机制是以交换信息的方式来确认实体身份的一种网络安全机制。
The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on.
网络信息安全技术一般包括身份认证、授权控制、审计、数据保密和数据完整性等几个方面。
Authentication is an important part in the network security. It can prevent illegal user from accessing network.
身份认证是网络安全技术的一个重要组成部分,它限制非法用户访问网络资源。
A ploy to ensure the security distribution of the key and the identity authentication of the peers in P2P network is provided in this paper.
文章提出了一种在P 2 P网络中安全分发密钥和进行对等点身份认证的方法。
But the clients often support one kind of security standard only, which makes the clients unable to connect to the network for the reason of unmatched authentication standard.
而客户端往往只支持其中的一种安全协议,这样当客户端要接入网络时会因为认证协议的不匹配而导致无法接入。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
While the identity authentication technology are network security and information system security the first barrier, it is time network information security technology a very important research field.
而身份认证技术是网络安全和信息系统安全的第一道屏障,它是网络时代信息安全技术非常重要的一个研究领域。
Authentication service is a base of implementation of security mobile AD hoc network, mobile users can exchange data communications securely between each other by certificate service.
认证服务是实现安全移动自组网的基础,移动用户可以通过证书服务进行安全数据通信。
Based on the demand status of the information resource, analyses the network information security technique and the current status of authentication system.
就信息资源保护的需求现状,分析了当前网络信息安全通常采用的技术以及身份验证技术现状。
Pointed out the existence of e-banking and the need to address network security, authentication and so on.
指出了网上银行存在并必须解决的网络安全、身份认证等问题。
As a identity authentication system, PKI provides the dependable security guarantee for network application.
作为一种技术体系,PK I为网络应用提供可靠的安全保障。
It can provide many network applications with all kinds of security service, such as authentication, confidentiality, information integrity and non-repudiation of transaction.
它可以为各种网络应用提供身份认证、信息的机密性和完整性以及交易的不可否认性等安全服务。
The first defense for the security of information on the network is ID authentication. A practical method of ID authentication is put forward to conquer the abuse of normal remote login mechanism.
网络信息安全的第一道防线是身份认证,文章基于一般远程登录机制的弊端,提出了一种实用的身份认证方法。
With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.
随着更多的应用系统加入到统一认证服务,本系统将会在教科网的信息安全体系中发挥更重要的作用,而且网络管理更加简单。
应用推荐