security authentication 中文意思是什麼

security authentication 解釋
安全認證
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  1. Sample kerberos 5 authentication security plug - in

    示例kerberos 5身份驗證安全插件
  2. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  3. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。
  4. In this paper, the belief logic system gny and it ' s related implementation tool spearii are utilized, ssl protocol is a focused instance, then the detailed analysis procedure from initial protocol model to various evolution protocol models is given, later the final evolution protocol model and ssl protocol are contrasted and thus the security analysis conclusion is drawn for ssl. during the analysis procedure two practical security authentication solutions are designed based on evolution protocol models

    本文採用著名的信念邏輯gny邏輯系統及其相關的形式化工具spear ,以ssl協議為分析實例,詳細闡述了從初始協議模型到各個進化協議模型的分析過程,並將最終的進化模型與ssl協議作比較,給出ssl協議的安全分析,同時在分析過程中以協議模型為基礎設計了兩個實用的安全認證方案。
  5. High - qualified designers and engineers of chaowei are able to provide various high - qualified design services such as ic software program, circuit board, product appearance, products structure, and product package, etc. the factories directly under chaowei have advanced production abilities including mould making, inection moulding, surface spray - painting, silk - screening, shift - screening, smt, welding and assembling, quartz clock core production, and quality check and assurance. chaowei held many design patents and utility model patents, at the same time, national clock and watch quality certification, national technical supervision bureau certification, usa fcc and astm security authentication, canada ic, and euro ce are achieved, the rich experience in oem and odm can ensure high quality products and professional service

    超維公司擁有一批高素質的專業設計師和工程師,有能力為國內外客戶提供包括ic軟體編程線路板設計產品外觀設計產品結構設計產品包裝設計等多方面高水準的設計服務超維的直屬工廠則擁有模具製造注塑成型表面噴漆絲印移印smt焊接裝配石英鐘機芯製造品質檢驗測試等先進的生產能力超維公司的產品擁有大量的外觀設計專利和實用新型專利,同時獲得了國家鐘表質量檢驗中心的合格證書國家技術監督局檢驗合格證書美國fcc認證和astm安全認證加拿大ic認證歐盟ce認證。
  6. " security, " however, is often used as a catch - all phrase that includes several individual components : physical security, authentication, and authorization

    然而, 「安全性」通常在所有的階段都需要使用,它包括幾個單獨的組件:物理安全性、身份驗證和授權。
  7. From then on, both sides will join hands in issuing e - card, promoting internet banking, handling online security authentication, and sharing marketing channels and customer resources

    自此,雙方將在發行虛擬聯名卡推廣電子銀行產品開展共同的網上安全認證共享營銷宣傳渠道及客戶資源等方面開展密切而廣泛的合作。
  8. All of zhongyi refrigerators, featured in the perfect design and delicate manufacture, with all the performance indexes reaching the national criterion, have been accredited with great wall security authentication

    「中意」牌系列冷櫃設計精良,製造精緻,各項性能指標達到國家標準要求,全部產品獲得「長城」安全認證書。
  9. Middleware services contain tfansaction monitors, security authentication and directory service etc. in the multi - tiered distributed architecture, business logic is divided into components according function, and th6 varous business components that make up a j2ee applicatioh are installed on different machines depending on the tier in the multi - tiered architecture to which the business component belongs

    中間件服務包括了事務處理、安全認證和目錄等底層服務。在多層的分散式應用模型中,應用邏輯根據功能分成組件,組成j2ee應用的組件根據它屬于的j2ee應用的不同層從而被安裝到不同的計算機中。
  10. First, it points out that it is necessary to shift the cognitive concepts and foster the awareness of green. secondly, it indicates that the macro approach for government is to develop the ecological agriculture, promoting the establishment of national security authentication system for agricultural products. it also says that the micro approaches are to actively implement the international green marketing strategy and strengthen the intensity of industry organizations

    第三部分針對如何順應綠色壁壘、擴大我國農產品出口的對策選擇進行了研究,首先要轉變認知觀念,樹立綠色意識;其次提出了政府的宏觀對策是發展生態農業,建設國家農產品質量安全認證體系,建立綠色貿易壁壘預警機制;企業的微觀對策是積極實施綠色營銷戰略;形成以龍頭企業為重點的市場競爭主體;加強行業組織力度;發展農產品精深加工業。
  11. Security authentication mechanism of distributed network management system based on mobile agent

    的分散式網管系統安全認證機制
  12. The same realm can be shared between websphere administration and for application security authentication and authorization

    Websphere管理和應用程序安全身份驗證與授權之間可以共享同一個領域。
  13. Third, security authentication is a very important part of e - business, so theory about security authentication is discussed in the thesis

    安全認證是電子商務中非常重要的部分,本文也介紹了有關安全認證的理論。
  14. Meanwhile, a 128 - bit encryption communication channel is established between ssl security authentication gateway and the clients to guarantee the information security

    同時,在進行訪問時, ssl安全認證網關和客戶端之間建立了128位加密的通信通道,保證用戶訪問信息的安全。
  15. Koal ssl security authentication gateway protects web servers ( such as oa server ) through certificates. only the employees who have valid certificates will be admitted to the web server

    格爾ssl安全認證網關通過使用數字證書來保護企業的web服務器(如oa服務器) ,只有具備有效數字證書的員工才能訪問web服務器。
  16. Digital video watermarking is a powerful tool for video copyright protection and security authentication. video data is redundancy, so video watermark usually encounters synchronization attacks, such as frame dropping, cut - paste etc, how to improve synchronization attack - resistance of video watermarking has become an important research trend

    數字視頻水印是版權保護和安全認證的有力工具,而視頻的高冗餘性特徵使得視頻水印極易受到幀切除、剪切-復制等同步攻擊,如何提高視頻水印的同步魯棒性成為數字視頻水印的重要研究內容。
  17. Experts predict that this service has great application prospects in areas such as mobile value - added services, e - commerce, logistics, security, authentication, advertising promotion and promotional information release

    專家預計,該業務在移動增值服務、 、物流、商品流通、身份認證、安防、防偽、廣告宣傳及促銷信息發布等方面的應用前景十分廣闊。
  18. Media management systems - session security, authentication, initialization protocol

    介質管理系統.會話安全校驗和初始化協議
  19. Security, authentication, and authorization in a grid

    網格中的安全、身份驗證和授權
  20. Components for security, authentication, and authorization

    安全、身份驗證和授權組件
分享友人