證書策略 的英文怎麼說

中文拼音 [zhèngshūlüè]
證書策略 英文
certificate policy
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ動詞(寫字; 記錄; 書寫) write Ⅱ名詞1 (字體) style of calligraphy; script:楷書 regular script2...
  • : Ⅰ名詞1 (通「冊」 古代寫字用的竹片或木片) bamboo or wooden slips used for writing on in ancient ...
  • : Ⅰ名詞1 (簡單扼要的敘述) summary; outline; brief account; résumé: 節略 memorandum; aide mémoire;...
  • 證書 : certificate; credentials
  • 策略 : 1 (制定的行動方針和斗爭方式) tactics 2 (講究斗爭藝術) tactful 3 [數學] (對策) policy; strat...
  1. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認,認過程與主機無關,有效的防範了身份和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保傳輸的機密性,完整性。
  2. The ipo will facilitate chinacast s efforts to secure new customers for certified distance learning courses, develop new solutions to address new market segments and further strengthen content offerings through new strategic partnerships

    集團相信,招股上市將有助chinacast尋求新客戶開辦遙距課程,開發新的解決方案,並透過結盟,強化內容的提供,從而發展新的行業市場。
  3. It is the operator of the country s official teachers portal, teacher. com. cn. the ipo will facilitate chinacast s efforts to secure new customers for certified distance learning courses, develop new solutions to address new market segments and further strengthen content offerings through new strategic partnerships

    集團相信,招股上市將有助chinacast尋求新客戶開辦遙距課程,開發新的解決方案,並透過結盟,強化內容的提供,從而發展新的行業市場。
  4. The idea to build up such a model originates from that of " web of trust " model of pgp mixed up with that of the delegation model of spki, as well as its resulted access control strategy by the combinations of trust and delegation policies

    「復合模式」思想包含兩層含義:一方面是它採用了將pgp以用戶為中心的信任模式和spki授權機制相結合;另一方面是它實現的訪問控制基於信任和授權的有機組合。
  5. A policy server creates security policy for every client in the system, and distributes it using a new kind of x. 509 attribute certificates with policy rule set item in it

    設計由服務器集中制定這些用戶安全,並傳輸攜帶規則集合的x . 509v4的屬性完成的安全分發。
  6. When a host, such as a secure web server, designates an issuer as a trusted root authority, the host implicitly trusts the policies that the issuer has used to establish the bindings of certificates it issues

    當主機(如安全web服務器)將某個頒發者指定為受信任的根頒發機構時,主機將隱式信任該頒發者用來建立它所發出的綁定的
  7. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認技術的基礎上,採用基於數字的認方式,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散式模型以及基於規則庫的審計,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。
  8. To discuss the strategy and thinking of implementing the vocational qualification system of hotel service

    論賓館服務職業資格制實施的與思考
  9. Community authorization services for creating credentials with inherent access control policies

    社區授權服務(用於創建具有集成訪問控制
  10. This thesis demonstrated in detail the bank organization, operation procedures, security requirement analysis, etc. it also lucubrated the information security theory, and analyzed the information security structural levels. based on the above results, a security design scheme was developed from a technically and operationally integrated consideration for e - banking system in beijing agriculture bank. technique factors consisted of security controls of website, including the firewall strategies, break - in testing and system scanning, ca digital certification system and security controls

    在研究了信息安全的相關理論的基礎上,提出了北京農行網上銀行系統的技術和業務上綜合考慮的安全設計方案,前者包括針對網站的安全控制,如包括防火墻、入侵檢測和系統掃描、 ca數字體系、安全控制等,後者以個人業務、對公業務、銀券通業務等流程說明業務的安全實現。
  11. The design of pmi system we done and its major modules, such as policy, log and certificate are conforming to xml formats. thus we can combine it to network service framework and guarantee the efficiency of network service security and trust

    本文探討了安全xml技術在pmi系統中的應用,所設計的pmi系統完全基於xml格式,包括、日誌以及等,使之可以與網路服務框架有機地結合起來,從而保安全可信網路服務的效率。
  12. The definitions of policies, the algorithms for generating role policies and for distributing each user role policy, a hash - based algorithm for lookup of filtering rules, and design of policy attribute certificate are described later, which figure the entirety of policy framework and its enforcement

    文中詳細表述了規則的定義、角色生成演算法、用戶級的分發演算法、包過濾演算法以及屬性的設計結構,完整介紹了整個框架的設計思想和實施過程。
  13. Other features include global address list lookup, policy provisioning whereby administrators can make supported policies more secure, support for certificate - based authentication, use of s mime to sign and encrypt mail, and server - based synchronization of tasks

    其他新增功能包括全球地址列表gal查詢管理員用以加強支持安全性的提供對基於的身份驗的支持使用s mime對郵件進行簽名和加密以及基於服務器的任務同步。
  14. The background of wireless transaction is introduced in this paper and a detailed analysis and study on wpki - the key point of wireless security, is made, with emphases on the requirements of wireless internet and the mainly relative technologies. in addition, user certificate management is mainly focused. general pki technology and concepts are also detailedly explained

    本文介紹了無線傳輸的背景,對無線ip網路安全中的關鍵技術? ? wpki進行了深入的分析和研究,重點分析了無線internet的應用需求和目前的主要實現技術;介紹了系統中涉及的實現技術規范,詳細討論了用戶管理;另外在論文中還詳細介紹了pki技術及其實現細節,涉及到一些對pki服務產生影響的、標準及新興應用。
  15. Specifies that there is no certificate policy extension in the certificate

    指定在中沒有證書策略擴展。
  16. This error would occur if a group policy has specified that all certificates must have a certificate policy

    如果某個組已指定所有必須具有一個證書策略,則會發生此錯誤。
  17. Gets a collection of object identifiers oids specifying which certificate policies the certificate supports

    獲取一個對象標識符( oid )集合,這些對象標識符指定支持的證書策略
  18. In addition the article discusses the cps ( certificate practice statement ), which could take effect on pkl applicability. at last the article shows wha1 is the next step

    並且對pki建設產生影響的cps ( certificatepracticestatement認業務申明)和證書策略進行了一些討論。
  19. Certificate management subsystem has functions mainly about the establishment of ca strategy, the issuing and abolishment of ca, the generation and issuing of blacklist, the establishment of blacklist tactic and the storage and issuance of ca and blacklist

    管理子系統主要負責數字證書策略的制定、數字的簽發、數字的廢除,黑名單的生成與簽發,黑名單的制定,數字與黑名單的存儲與發布等功能。
  20. Following x. 509 v3, pre - definition certificate strategies available ; supporting issuing several certificates ( user s certificate, ssl client certificate, institution certificate, equipment certificate, e - mail ccertificate and ntc certificate etc. ), supporting csp standard issuing mode

    509v3標準,可預定義多種證書策略,可支持簽發多種(用戶, ssl客戶端,機構,設備,電子郵件, ntc等) ,支持csp標準發模式
分享友人