network-based authentication 中文意思是什麼

network-based authentication 解釋
基於網路的認證
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  • based : 基準
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  1. Study of network authentication based on radius protocol

    協議的網路認證技術研究
  2. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  3. The paper abstracts out the palmprint mainline characteristic owing to palmprint image gradation by the gray value characteristic property method, defining the online palmprint characteristic space with the form of the polar coordinate and compressing the dimension, at last we use the neural network to accomplish the design of identification authentication system with the on - line palmprint as the mating algorithm. based on this, a fast and reliable system of identification authentication can be built

    採用基於掌紋圖像灰度特性的方法提取出掌紋的主線特徵,以極坐標的形式定義在線掌紋的特徵空間並降維處理,最後用神經網路作為匹配演算法完成在線掌紋身份驗證系統的設計,以此為基礎建立了快速、可靠的新型身份認證系統。
  4. Based on the analysis of relatively mature network security technology that can be introduced by sip, by the means of improving and applications, the article realizes tls hop - by - hop encryption, s / mime end - to - end encryption mechanism, improved http digest authentication, s / mime end - to - end signature mechanism and so on

    在分析現今可以借鑒的用來對sip通信進行保護的相對比較成熟的網路安全技術的基礎上,通過改進和應用,實現了包括tls逐跳加密, s / mime端到端加密等的加密機制以及改進的http摘要認證, s / mime端到端簽名等的身份鑒定機制。
  5. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。
  6. Aaa ( authentication, authorization, accounting ) is the key of oss, in this theis, the aaa protocols and application requirement is analyzed first, and then the design the implementation of aaa subsystem are described in detail including following topics : introduced basic concepts of ftth based on epon, then show the whole architecture of our ftth network ; analyzed oss architecture running on broadband system and the aaa subsystem ; analyze and design aaa component in detail, in which we make out the solution through problems and integrated them to the whole system ; extended standard radius protocol and focus on the designation and implementation of authentication based on web ; according to the designation and implementation in my work, i designed a series testing, and improve original designation through test

    本文針對aaa ( authentication , authorization , accounting )協議和應用需求進行了較深入全面的研究,並設計實現了該子系統,主要包括以下內容:介紹了基於epon的城域ftth寬帶網路的基本概念,然後從整體的角度介紹了我們的ftth網路的結構;分析了在此網路之上的運營支撐系統總體框架和aaa子系統在運營支撐系統中的作用;對該網路和運營系統中的認證授權進行了詳細的分析和設計,提出解決問題的方法,形成設計方案;對標準協議進行了擴展,其中詳細介紹了基於web的用戶認證授權方案的實現和相關配置。針對我所設計和實現的子系統設計了一系列的測試,通過測試改善和優化了部分功能,且給出了測試結果。
  7. In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system

    論文中對鐵路信息系統現狀進行了分析,歸納出明確的需求及目標,並依據信息系統安全中有關訪問控制框架及機制的相關理論設計並實現了鐵路信息系統安全框架中的數字證書( pki ca )及用戶目錄管理( ldap )系統、網路訪問代理和認證授權機制、基於pki ca的身份認證和授權系統及應用系統安全框架和支持平臺。
  8. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  9. Vpn is the technology of building a intranet based on the public network with the support of tunneling technology, encapsulation and authentication methods

    虛擬專用網( vpn )是採用隧道技術以及加密、身份認證等方法,在公共網路上構建企業網路的技術。
  10. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱密碼技術、非對稱密碼技術、消息認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證網路通信數據的機密性、完整性和對通信各方進行認證的機制。
  11. User identification and message authentication are two important aspects of network security. an interactive /. cro knowledge proofs based user identification and also a cross - domain message authentication scheme are proposed in the paper

    本文還設計了一個跨域的信息認證系統,給出了協同產品開發中的跨域信息模型,並提出了相應的跨域認證方案。
  12. The system adopts cisco secure acs ( access control server ) 2. 6 of cisco company as the authentication server, iplanet directory servers. 1 as the directory server and star - s1924f switch based on 802. 1x as the authentication client namely user network access device to implement centralize management of the user account and password and so on in all the application, and the authorization access based on port

    系統採用cisco公司的安全訪問控制器ciscosecureacs ( accesscontrolserver ) 2 . 6作為認證服務器, iplanetdirectoryserver5 . 1作為目錄服務器,以及實達的基於802 . 1x的交換機star - s1924f作為用戶接入設備即認證客戶端,實現用戶在所有應用的賬號與密碼等相對固定的信息集中管理和基於角色的訪問控制。
  13. The dao pattern and hibernate framework is the persistence tier. some essential technologies are introduced and their solutions are provided, including data access technology, dynamic configuration of network business, identity authentication based on digit certificate, remote access technology and the operation of report forms

    論文對系統實現中的各項關鍵技術進行了深入研究,其中包括:數據訪問技術、上網業務動態配置、基於數字證書的身份認證、遠程訪問技術和報表處理等,並給出了它們各自的具體解決方案。
  14. Security authentication mechanism of distributed network management system based on mobile agent

    的分散式網管系統安全認證機制
  15. After studying ms - pptp protocol, we think that the security of a vpn is based on the security of its authentication and encryption protocols. if a vpn ' s cryptography is weak, then its security is no better than a non - private virtual network routed over the internet. since companies are relying upon vpns to extend trusted internal permiters to remote offices, breaking the security around such a tunnel is tantamount to defeating all of the security around the internal permiter

    本文對ms - pptp協議實現進行了深入的分析、研究,認為:認證和加密協議的安全決定了vpn的安全性,如果vpn認證和加密手段是脆弱的,那它的安全性並不比在internet上使用非vpn傳輸數據高,因為一個組織依靠vpn擴展其可信的內部邊界,允許外部分支訪問內部網路,破壞隧道的安全性等於破壞了所有內部網路。
  16. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  17. This paper presents one e - commerce security model which is based on modern cryptography, protocols and internet open trade protocol model. this paper also presents a pki - based security model of intranet to proffer effective security mechanisms including authentication, supervisal, confidentiality, access control, and non - repudiation network service

    本文深入探討了b2b電子商務中的安全平臺構架,研究了在internet上,利用現代密碼學技術和密碼學協議,在先進的開放式電子商務模型基礎上實現安全的電子商務活動的可行性和實現的某些細節。
  18. Design and implementation of network billing system based on authentication of users

    基於用戶認證的計費系統的設計與實現
  19. According to the characteristices of network manufacture system, this paper analyses its security problem such as identity authentication, data encryption, data integrality authentication. this paper brings forword a resolvent based on ipsec vpn for network manufacture system security problem

    本文根據網路化製造系統的特點,分析了網路化製造系統的網路安全需求,包括身份認證、數據保密性、數據完整性等問題,以ipsecvpn技術為基礎,提出了一種適合網路化製造系統的安全解決方案。
  20. The second part gives a design method of a typical application - campus network firewall. this part first analyses the network code of linux operation system, and builds a firewall system based on the packet filtering of linux with proxy and authentication. the purpose is not only protect the network security but also try to decrease expenses

    文中分析了linux操作系統的網路部分代碼,並提出了基於linux包過濾為主體,結合代理技術和身份認證技術的防火墻系統,目的在於以保障網路的安全為前提,同時又要盡可能的降低各種費用。
分享友人