驗證和授權 的英文怎麼說

中文拼音 [yànzhèngshòuquán]
驗證和授權 英文
authentication and authorization
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 和動詞(在粉狀物中加液體攪拌或揉弄使有黏性) mix (powder) with water, etc. : 和點兒灰泥 prepare some plaster
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • 驗證 : test and verify; checking; proving; testing; confirmation; [數學] corroboration; inspection; veri...
  • 授權 : empower; authorize; warrant
  1. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶資源層次關系圖、訪問控制參考模型訪問控制過程模型,並定義了各個模型中的相關元素關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  2. A collaboration can make a service call to an ldap directory for authentication and authorization using an ldap adapter available as a websphere business integration accelerator supportpac

    協作可以使用ldap適配器來對ldap目錄進行服務調用,從而進行身份驗證和授權
  3. The declarative method offers ease of use, while the programmatic method provides finer levels of security control with respect to resource authentication and authorization

    宣告方法提供易用性,程式設計方法為資源的身份驗證和授權提供更好的安全控制級別。
  4. For the opening of the web applications, user ’ s miss - operation and deliberate behavior may go beyond his rights. so user who wants to login into the system must be authenticated and authorized

    基於web應用的erp系統中,由於系統的開放性,為了防止用戶的誤操作或惡意越行為,必須對登錄系統的用戶進行驗證和授權
  5. To use the same database and user information as the

    使用相同的數據庫用戶信息,以便使用一個數據庫即可獲得身份驗證和授權信息。
  6. The saml standard provides interfaces that allow third parties to send their requests for authentication and authorization

    Saml標準提供了允許第三方實體請求驗證和授權信息的介面。
  7. " security, " however, is often used as a catch - all phrase that includes several individual components : physical security, authentication, and authorization

    然而, 「安全性」通常在所有的階段都需要使用,它包括幾個單獨的組件:物理安全性、身份驗證和授權
  8. Lets you test authentication and authorization requests from a windows client

    讓您可以測試來自windows客戶的驗證和授權請求。
  9. For a link, to test authentication and authorization requests from windows clients

    獲得相關鏈接,它可用於測試來自windows客戶機的驗證和授權請求。
  10. Implementing custom authentication and authorization

    實現自定義身份驗證和授權
  11. Authentication and authorization in the. net framework

    > . net framework中的身份驗證和授權
  12. End - to - end authentication and authorization

    端到端的身份驗證和授權
  13. Walkthrough : implementing custom authentication and authorization

    演練:實現自定義身份驗證和授權
  14. New asp. net features provide built - in support for authenticating and authorizing users

    新增的asp . net功能為進行用戶身份驗證和授權提供了內置支持。
  15. Security extensions are used to authenticate and authorize users and groups to a report server

    安全擴展插件用於對用戶組進行身份驗證和授權,以便其能夠訪問報表服務器。
  16. Fundamentally, securing your replication environment is a matter of understanding your authentication and authorization options, understanding appropriate uses of replication filtering features, and learning specific measures for securing each piece of the replication environment including the distributor, publisher, subscribers, and the snapshot folder

    基本上,保護復制環境需要了解身份驗證和授權選項如何正確使用復制篩選功能,以及用於保護復制環境的每個部分包括分發服務器發布服務器訂閱服務器快照文件夾的具體措施。
  17. Different people have different access control rights to different resources. how to authenticate and authorize users is the key to build a stable system

    不同的用戶對不同的資源擁有不同的訪問限,如何對眾多的用戶進行驗證和授權是成功構建系統的一個關鍵。
  18. For stronger security, turn on websphere application server security to secure each of the transports with ssl, and to enable strong authentication and authorization

    要有更好的安全性,需要啟用websphere application server安全性來保護每個帶有ssl的傳輸並且啟用強大的驗證和授權功能。
  19. Security, authentication, and authorization in a grid

    網格中的安全、身份驗證和授權
  20. Components for security, authentication, and authorization

    安全、身份驗證和授權組件
分享友人