authorization protocol 中文意思是什麼

authorization protocol 解釋
授權協議
  • authorization : n. 1. 授權,委任。2. 認可,核準。
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. 5. we solve the discovery problem by developing a complete authorization certificate query protocol for distributed environment based on clarke ' s discovery algorithm [ 132 ] for local certificate databases

    設計了完整的授權證書鏈查詢協議,結合clarke本地證書鏈發現演算法[ 132 ] ,解決了p2p信任授權模型中授權證書鏈的決定問題。
  2. The other one is pppoe ( point - to - point protocol over ethernet ), which is fit for adsl ( asymmetric digital subscriber line ) users. we succeeded in the control of the switch ports and the traffic accounting under dhcp mode, and in the user ' s authentication, authorization and accounting under pppoe mode

    本文給出了在寬帶網上採用radius (遠程撥號用戶認證服務)協議結合pppoe (以太網上的點對點協議)實現用戶鑒別、授權和計費管理的解決方案和實現方法。
  3. Is a protocol to transport authentication and authorization information in an xml message

    是以xml消息傳輸認證和授權信息的協議。
  4. Aaa ( authentication, authorization, accounting ) is the key of oss, in this theis, the aaa protocols and application requirement is analyzed first, and then the design the implementation of aaa subsystem are described in detail including following topics : introduced basic concepts of ftth based on epon, then show the whole architecture of our ftth network ; analyzed oss architecture running on broadband system and the aaa subsystem ; analyze and design aaa component in detail, in which we make out the solution through problems and integrated them to the whole system ; extended standard radius protocol and focus on the designation and implementation of authentication based on web ; according to the designation and implementation in my work, i designed a series testing, and improve original designation through test

    本文針對aaa ( authentication , authorization , accounting )協議和應用需求進行了較深入全面的研究,並設計實現了該子系統,主要包括以下內容:介紹了基於epon的城域ftth寬帶網路的基本概念,然後從整體的角度介紹了我們的ftth網路的結構;分析了在此網路之上的運營支撐系統總體框架和aaa子系統在運營支撐系統中的作用;對該網路和運營系統中的認證授權進行了詳細的分析和設計,提出解決問題的方法,形成設計方案;對標準協議進行了擴展,其中詳細介紹了基於web的用戶認證授權方案的實現和相關配置。針對我所設計和實現的子系統設計了一系列的測試,通過測試改善和優化了部分功能,且給出了測試結果。
  5. The thesis emphasize further research on both identity identification and authorization access based on role access control. a new identity identification protocol and a new method of access authorization are presented

    論文著重對身份認證和基於角色的存取控制授權訪問進行了深入研究,並提出新的身份認證協議和訪問授權方法。
  6. This helps a company build their application, and it doesn t matter where it gets deployed or whether it s using lightweight directory access protocol ldap, tivoli access manager, resource access control facility racf, or any authorization entity, it still fits into an environment

    這可以幫助公司構建自己的應用程序,對哪些地方進行部署,以及是使用ldap (輕量級目錄服務協議) 、 tivoli access manager 、 racf ( resource access control facility ) ,還是使用其他身份驗證實體,這些都無關緊要,公司仍然可以適應某種部署環境。
  7. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準令牌交換協議相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
分享友人