認證授權 的英文怎麼說

中文拼音 [rènzhèngshòuquán]
認證授權 英文
ca:certificate authority
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  • 授權 : empower; authorize; warrant
  1. It does the job of authentication and authorization

    它可以完成的工作。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. With the rapid development of the internet and electronic commerce, it is required that service division should be more and more specialized and fine - sorted. as a result, public - key infrastructure ( pki ), which has both the function for the authentication and the function for the authorization, has become maladjusted in the present information technology society

    隨著internet和全球電子商務的突飛猛進,對服務分工要求越來越細的同時,現有公鑰基礎設施pki框架中同時實現身份管理的功能模式,已越來越不適應當代信息社會的發展需求。
  4. Management " think - tank " that conducts research, publishes books and articles, and provides training on all aspects of organizational management

    -發展公共關系管理理論與實務研究,協助公關管理人員交流辦理prat公關管理人員認證授權等。
  5. Manufactured the excellent products and founded the fashion life that is our dealing faith. after several years effort, we have developed. after registration, we are awarded emphases enterprise by experiment zone in jul 2001 ; medun - smal scale enterprise guangdong in dec ; science technology progress in jul 2002 ; jieyang famous trademark in jan 2003 ; passed is09001 2000 international quality system authentication ; in may, nation quality trustworthy products and the national consumer satisfaction of the quality service unit ; in jan a quality price trustworthy unit ; in mar, the enterprise being faithful to its contract keeping promise ; in apr, elected as the director unit by guangdong home appliance manufacturers ; in oct awarded china excellent medun - smal scale science enterprise ; in apr. elected as the director unit by jieyang excellent medun - smal scale enterprise sodality

    注冊成立後於2001年7月被試驗區評為「重點企業」 ,同年12月被廣東省科學技術廳予「廣東省民營科技企業」於2002年7月獲試驗區「科學技術進步獎」 2003年1月被揭陽市工商行政管理局予「揭陽市知名商標」 ,同年4月通過is09001 : 2000國際質量體系,同年5月被中國產品推廣評價中心予「全國質量信得過產品」 ,同時被中國產品質量申訴外予「全國質量服務消費者滿意企業」 ,同年6月被揭陽市物價局揭陽市技術監督局予「價格質量信得過單位」於2004年3月被揭陽市政府予「守合同重信用企業」 ,同年4月被廣東省家電商推選為理事單位,同年10月被評為「中國優秀民營科技企業」 ,並在北京人民大會堂參加表彰大會於2005年4月被揭陽市民營企業依法維聯宜會推選為理事單位。
  6. Microsoft certified solution providers ( mcsps ) and authorized support centers ( ascs ) specialize in providing support packages for hardware, network, and software products from both microsoft and other vendors

    Microsoft的方案提供商( mcsp )和支持中心( asc )專門為microsoft以及其他經銷商的硬體、網路和軟體產品提供支持軟體包。
  7. The tradition safety technique such as authenticate, accredit, encrypt, fire - wall and the control of accessing can not protect the information of network well. the safety of network faces great challenge and imperil

    傳統的安全保護技術如、訪問控制、防火墻和加密等外圍防衛機制已力不從心,計算機網路信息安全正面臨著極大的威脅和挑戰。
  8. Authentication, authorization, and accounting

    認證授權及帳務
  9. By the test, the system realizes functions of user authentication, real - time accounting, phone - bill query, etc, which are the basic demands of the voip authenticating and accounting technology

    通過測試,本系統實現了數據採集、認證授權、計費處理、話單查詢、系統管理等功能,符合voip安全計費的基本要求,適用於voip業務的安全和計費管理。
  10. When constructing countrywide production & management decision support system of tobacco industry, there are security questions in data integrity, secrecy, irreversibility, and identity authentication authorization

    在構建全國煙草行業卷煙生產經營決策信息系統(簡稱國家煙草一號工程)中,存在數據完整性、機密性、不可否性及身份認證授權等安全問題。
  11. This paper gives the collectivity structure and function structure of lbs system and this paper develops the main system module including counting model, application management model, system management model, consumer management model, accredit model, interface model etc

    本論文設計了位置服務本地接入子系統的總體結構,具體實現計費模塊、業務管理模塊、系統管理模塊、用戶管理模塊、認證授權模塊、介面適配模塊設計。
  12. Aaa ( authentication, authorization, accounting ) is the key of oss, in this theis, the aaa protocols and application requirement is analyzed first, and then the design the implementation of aaa subsystem are described in detail including following topics : introduced basic concepts of ftth based on epon, then show the whole architecture of our ftth network ; analyzed oss architecture running on broadband system and the aaa subsystem ; analyze and design aaa component in detail, in which we make out the solution through problems and integrated them to the whole system ; extended standard radius protocol and focus on the designation and implementation of authentication based on web ; according to the designation and implementation in my work, i designed a series testing, and improve original designation through test

    本文針對aaa ( authentication , authorization , accounting )協議和應用需求進行了較深入全面的研究,並設計實現了該子系統,主要包括以下內容:介紹了基於epon的城域ftth寬帶網路的基本概念,然後從整體的角度介紹了我們的ftth網路的結構;分析了在此網路之上的運營支撐系統總體框架和aaa子系統在運營支撐系統中的作用;對該網路和運營系統中的認證授權進行了詳細的分析和設計,提出解決問題的方法,形成設計方案;對標準協議進行了擴展,其中詳細介紹了基於web的用戶認證授權方案的實現和相關配置。針對我所設計和實現的子系統設計了一系列的測試,通過測試改善和優化了部分功能,且給出了測試結果。
  13. In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system

    論文中對鐵路信息系統現狀進行了分析,歸納出明確的需求及目標,並依據信息系統安全中有關訪問控制框架及機制的相關理論設計並實現了鐵路信息系統安全框架中的數字書( pki ca )及用戶目錄管理( ldap )系統、網路訪問代理和認證授權機制、基於pki ca的身份系統及應用系統安全框架和支持平臺。
  14. Knowing equity card full name is card of authorization of stock offer to buy, it by appear on the market the company is issued, to grant the investor of hold authority card in future a certain time or some period of time buy the right that measures this company stock certainly with the value that affirms beforehand

    全稱是股票,它由上市公司發行,給予持有的投資者在未來某個時間或某一段時間以事先確的價格購買一定量該公司股票的利。
  15. Only after the user is validated and authorized can the content stored in a cache ( including that deployed from the core node to an edge node and stream media content buffered like real, windows mms, etc. ) be provided directly from the cache at the edge node with the access time, number of accesses and data volume obtained recorded

    訪問在cache上緩存了的內容(包括由核心部署到邊緣節點上的內容以及流媒體緩存內容如real 、 windowsmms等) ,只有在用戶通過的基礎上,才能直接從邊緣節點的cache上獲得服務,並且有訪問時間、訪問次數、獲取的數據量等等的訪問記錄。
  16. We make full use of the user - nas - radius server three - section model to realize authentication, authorization, accounting and location management. so even if the user is in motion, he might be always online

    從而,能夠對用戶進行、記賬和位置管理,特別是當發生移動時保通信不被中斷,從根本上保障了簽約用戶的利益。
  17. Follow along to find out how these two apis combine to provide the core functions of the j2ee web application security framework : authentication, authorization, and transport - level security

    跟隨作者去發現如何結合這兩個api以提供j2ee web應用程序安全框架的核心功能:和傳輸層安全。
  18. It is to be expected that with the implementation of this new gateway technology, centralization of accounting management will occur, and this in turn will lead to more efficient auditing and accounting practices for multiple users such as dial - in users and those accessing through a lan network

    與其它網路安全產品結合使用,可以達到radius用在撥號接入時所取得的效果。從而也實現了撥號接入和局域網接入等多種用戶的、審計和記帳的集中統一管理。
  19. By combining authentication, authorization, accounting ( aaa ) and mobile ip, an integrated scheme is proposed according to the authentication and registration in mobile ip

    和記賬( aaa )與移動ip相結合,提出了一種整合方案。
  20. The cisssps adopts three - layer - structure design conforming to j2ee standard, which internally includes platform modules such as search engine, application install management, data management, resources management, safety control etc. and externally provides unified connecting points for information service, unified customer identity attestation, authorization management and access control

    四川公安綜合信息查詢系統採用符合j2ee標準的三層架構設計開發,內部包含查詢引擎、應用配置管理、數據管理、資源管理、安全控制等平臺化組件;對外提供統一的信息服務接入,統一的用戶身份管理和訪問控制。
分享友人