access authentication 中文意思是什麼

access authentication 解釋
訪問鑒別
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. Authentication for extranet and internet access

    Extranet和internet訪問的身份驗證
  3. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。
  4. With the popularization of application of computer network and development of telecommunication and computer technology, authentication / accounting server of network access server ( nas ) becomes an important part of remote access device

    隨著計算機網路應用日益普及和通信技術、計算機技術的發展,網路接入服務器( nas )認證計費系統已經成為遠程接入設備的一個重要組成部分。
  5. Anonymous access and authentication control

    「匿名訪問和驗證控制」
  6. Button in the anonymous access and authentication control section

    在「匿名訪問和身份驗證控制」節中單擊「編輯」按鈕。
  7. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn密碼系統的實現,我們採用socks協議做為vpn實現協議,使用kerberos協議來進行身份認證,使用國內專用密碼演算法來進行數據的加解密。
  8. To complete this example, substitute a url that you can access and that requires form - based authentication

    為了完成這個示例,請用您可以訪問的並要求基於表單的認證的url來替代。
  9. Active directory application mode adam is a new mode of the active directory directory service that is designed to meet the needs of line - of - business applications that require a dedicated lightweight directory access protocol ldap data store, e - commerce applications that require simple ldap authentication support, and enterprise environments that require an application directory that is separate from their network operating system infrastructure directory

    Active directory應用程序模式( adam )是active directory目錄服務的新模式,設計用於滿足以下應用程序或環境的需要:需要專用輕型目錄訪問協議( ldap )數據存儲的行業應用程序,需要簡單ldap身份驗證支持的電子商務應用程序,以及需要獨立於網路操作系統( nos )結構目錄的應用程序目錄的企業環境。
  10. Identity authentication has been widely applied in detection of criminal cases, and other domains, which need authentication to control access such as government, custom, and financial department

    身份認證廣泛應用於刑事案件的偵破,以及其它需要人身鑒定的領域如政府機關、海關、登機、金融等要害部門的出入。
  11. The paper research the access authentication procedure of the wlan

    本文的研究主要針對無線局域網的接入認證過程。
  12. Now the csp modules that we can free avail all come from the software csp shipped with the windows system. these software csps are portable in that they can be carried as an executable file, but they inevitably have some limitations : the software csps have the less tamper - resistant and would be inconvenient in the fields of the interactive logon, e - mail signing, e - mail decryption and remote access authentication ; ' they have the lower level degree of security

    但鑒於我們現在可獲得的一系列的csp模塊,均來自windows系統自帶的軟體csp ,軟體csp可以以可執行性文件的形式存在、具有易攜帶性的優點,但是它在防篡改、遠程登陸、用戶的身份認證等領域有其不可克服的缺陷,安全等級比較低。
  13. Windows nt4 security patch : remote registry access authentication vulnerability

    Windows nt4安全修補程序:遠程注冊表訪問驗證漏洞
  14. Download details : windows nt4 security patch : remote registry access authentication vulnerability

    下載詳細信息: windows nt4安全修補程序:遠程注冊表訪問驗證漏洞
  15. This paper focuses on the access authentication period of wlan, and analyzes the disadvantages and advantages of traditional ways

    本文的研究主要針對無線局域網的接入認證過程,分析傳統的無線局域網的安全處理方法存在的缺點和不足。
  16. Indicates that the digest access authentication should be used on the connection

    指示應在該連接上使用簡要訪問身份驗證。
  17. Several present access authentication technologies are compared, the 802. 1x is selected to act as the authentication protocol framework because it is considered to be better

    比較了現有主要接入認證技術,選用較完善的802 . 1x作為接入認證框架。
  18. At the beginning of the paper, the deficiency of the wlan ’ s basic security policy is analyzed, so the access authentication is proposed to enhance its security

    首先分析了無線局域網安全處理方法中的缺陷和不足,採用接入認證機制來提高它的安全性。
  19. The paper goes on introducing the working processes of 802. 1q, snmp, 802. 1x protocols and gives an idea of simulating the 802. 1x access authentication mode by using vlan dynamic - configuration and abnormality real - time handling as the main technologies employed

    然後在對802 . 1q和snmp協議分析的基礎上提出了用vlan動態配置和異常監控作為主要技術的方法來實現一種對802 . 1x的模擬,實現802 . 1x的功能。
  20. Different kinds of wide - band ethernet access authentication technologies has emerged including pppoe, vlan + mac / ip, web portal etc. as a new method of ethernet access authentication and control, 802. 1x has been more and more widely accepted due to its absence of faults in the other methods

    最近802 . 1x作為一種新的以太網接入認證標準正在漸漸被廣泛接受。由於802 . 1x解決了以上各種技術的缺點, 802 . 1x將成為以太網接入認證技術的主要方向。
分享友人