英语人>网络例句>authentication 相关的网络例句
authentication相关的网络例句

查询词典 authentication

与 authentication 相关的网络例句 [注:此内容来源于网络,仅供参考]

Based on chaotic theory combined with one time password authentication technology, an identity authentication scheme was presented which can resist attacks in common and resolve ordinary one time password unresisting small number attack and insecurity problems of transmitting plaintext iteration times and easily finding the security leak of collisions in traditional Hash function.

基于混沌理论和一次性口令认证技术,提出一种可以抵御常见攻击的身份认证方案。

Authentication is the process of accepting or denying a request from a client, so AuthFilt will be notified each time an authentication request comes in. This sample uses a file to keep track of authorized users, but you might modify this sample to access a database which holds user info.

身份验证是接受或拒绝来自客户端的请求过程,因此AuthFilt将通知对方身份验证请求来英寸本示例使用一个文件的时间来保持跟踪的授权用户,但您可能会修改这个示例访问数据库,其中保存用户信息。

Now that we have the user authentication level and the required authentication level we can compare the two.

现在,我们有用户身份验证级别和所需的身份验证级别,我们可以作一比较。

The company There is one batch professional technician and administrator,Not only like this,the company in Oct,2004 obtain national mandatory product quality 3C authentication moreover pass ISO9001: 2000 quality system authentication in 2006.All standard of complanate toughened glass are accepted the insurance by People''s Insurance Company of China.

公司拥有一批具有专业水平的技术人员和管理人才,并于2006年通过ISO9001:2000质量体系认证,2004年10月获得国家强制性产品质量3C认证;各种规格平面钢化玻璃系列产品,被中国人民保险公司承保。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

This thesis deeply researches the J2EE security strategy on the application tier of enterprise system. The security strategy predigests the information security model and meets the security requirements expediently. But there are some disadvantages when the security requirements become more complex. The expositive security on the Web-Tier can not offer more information for authentication; there is no authentication for EJB-Tier to use, make the EJB-Tier depend on the Web-Tier; J2EE uses database or application server to manage the role information. Use database to manage the role information will increase the complex of enterprise application, and the way of application server will reduce the ability of migrate other J2EE platform. To solve these problems, the thesis designs an improved security strategy model.

本文从企业级系统应用层安全的角度出发,深入研究J2EE多层体系结构的安全策略模型。J2EE提供的安全策略简化了系统的信息安全模型,能够很方便地满足基于J2EE的分布式应用系统的安全需求,但是在面对更加复杂的安全需求时,J2EE安全策略在验证授权和角色管理中还存在不足之处:其在Web层的声明式验证机制无法为用户提供更多验证信息,可扩展性较差;在EJB层缺少业务逻辑层可供采用的验证机制,而是借助于Web层的验证机制,其耦合程度较高有悖于业务逻辑分离于表现逻辑的原则;在角色管理方面,J2EE采用数据库或者应用服务器来管理角色信息,其中,数据库管理角色的方式增加了应用开发的复杂度,应用服务器管理角色降低了系统的可移植性,两者都具有片面性。

The model designs an extensible authentication to replace the way which the expositive security uses on Web-Tier and an authentication for controlling the accessing to the protect resource on EJB-Tier. The improved model uses directory server to manage the role information. It reduces the complex of application development, and increases the ability of migrate other J2EE platform.

针对以上不足,本文提出了改进的安全策略模型,在Web层设计可扩展的验证模块来代替原来声明式安全采用的验证机制;在EJB层设计验证模块用于对业务逻辑资源的访问控制;在角色信息管理方面,使用目录服务器存储用户角色,来降低系统开发复杂度,提高系统的可移植性。

Taking the development trend of modern software and the traditional development technique based on OOP as the background,this paper researched authentication and authorization system based on JASS,analyzed advantage and disadvantage of traditional method,designed authentication and authorization system based on AOP and constructed the system prototype.

文章首先以现代软件的发展趋势以及传统基于OOP的开发技术为背景研究了JASS认证和授权系统,并分析了传统方法的优缺点,设计了基于AOP的认证授权系统,并构造了系统原型,该系统具有良好的可重用性和可维护性。

The original password authentication is vulnerable to guess attack and server personating attack . to overcome the vulnerability of this scheme , this paper designs a simple and efficient password authentication schema .

针对postgresql原有认证机制具有易遭受口令猜测攻击和服务器端假冒攻击的缺陷,本文设计了一种简单而有效的口令认证机制。

A practical efficient one - time password authentication protocol is presented which based on the symmetric algorithm , which conquers common challenge - response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack

该方案克服了通常的质询响应认证方案的弱点,可以用在网络环境下,实现通信双方的相互认证,防止重放攻击和冒充攻击,实现简单,执行效率高。

第6/54页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

Cynanchum Lingtai apricot production in the average weight 65 grams, the brightly-colored fruit, juicy rich, sweet-sour taste, sweet from the nucleolus, when the late Qing Dynasty famous Shaanxi, Gansu provinces, the Qing imperial court Tongzhi tribute for years.

灵台生产的牛心杏平均单果重65克,果实色泽鲜艳,汁多味浓,甜酸适口,离核仁甜,清末时就驰名陕、甘两省,清同治年间曾为朝廷贡品。

Chenopodium album,Solanum nigrum, and Amaranthus retroflexus were very susceptible to the herbicides. Polygonum persicaria and Abutilon theophrasti were relatively less susceptible to the herbicides, and Lycopersicon esculentum was not susceptible to it. The relationship between reduction rates of weed biomass and PPM values of weed leaves 2,4, and 6 days after treatment was established.

供试的6种杂草对该混剂的敏感性存在显著差异:红心藜Chenopodium album、龙葵Solanum nigrum和反枝苋Amaranthus retroflexus对该混剂最敏感,ED90值分别为47.65、71.67和29.17g/hm2;春蓼Polygonum persicaria和苘麻Abutilon theophrasti敏感,ED90值分别为96.91、114.20g/hm2;而番茄不敏感。

However, I have an idea.

不过,我有个主意。