OAuth operates much like a credit card does, but with authorization data as the currency. OAuth运作起来如同一张信用卡,只是将授权数据作为货币。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption. 我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
SAML shows software developers how to represent users, identifies what data needs to be transferred, and defines the process for sending and receiving authorization data. SAML向软件开发人员展示了如何表示用户、标识所需传送的数据,并且定义了发送和接收权限数据的过程。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption. 这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
This links authorization data to an identity. 这可在授权数据和实体之间建立联系。
Based on the business needs above, you can set up your LDAP server to manage the following transaction authorization data 根据上述业务需要,可以设置LDAP服务器,使之管理以下业务授权数据
As mentioned earlier, no single system catalog view contains all the available authorization data. 如前所述,没有哪个单独的系统编目视图可以包含所有可用的授权数据。
If a db2move operation is to succeed, the requesting user ID must have the correct authorization required by the underlying DB2 data movement utilities. 如果db2move操作想要成功执行,所使用的用户ID必须具有底层DB2数据移动工具所需要的适当授权。
Many databases have strong auditing and authorization built in to protect corporate data. 很多数据库都有强大的内置审核和授权机制,以保护公司数据。
Realm Write Operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control. Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain. 授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
During this period, any second applicant for market authorization would only be granted market authorization if he submits his own data. 在此期间,对于任何第二个申请销售许可的人,只有当其提交自己的数据时方可被授予销售许可。
Altering statistical data without authorization or fabricating statistical data; 自行修改统计资料、编造虚假统计数据的;
Based on unified identity authorization, search engine and data mining method, a model of self-archiving service-based medical digital library was proposed in this paper. 利用统一身份认证、搜索引擎和数据挖掘等技术,提出了基于个性化服务的医学数字图书馆的体系结构和设计模型。
Taking the methods from different layers such as authentication, authorization, protecting sensitive data, code access security etc. 采用身份验证、授权、敏感数据保护、代码访问安全等多层次的安全方法可以有效的保障应用系统安全。
In the poloidal field remote control system ( PF-RCS), its security mechanism is deployed on the identification and authorization, data ex-change, encryption technique, and mandatory control to access the experimental facility, which realizes the multi-layer security control. 在PF远程控制系统中,通过构建托管控件,集成身份验证和授权、数据交换服务及数据加密等多种安全技术,实现了该系统的多层安全控制。
Research of PMI Based Authorization Management System in Common Data Security Platform 通用数据安全平台中基于PMI的授权管理体系研究
Of the TCP/ IP model, IPSec has the advantages such as anti-attack, identity authorization, data integrity and confidentiality and perfect forward security. IPSec作为一种实施于网络层(IP)的安全协议,具有抗攻击、保护数据完整性、保护数据机密性和完美向前保密的诸多特性。
This article makes a research about HTTP proxy protocol's implementation, and it also makes a discussion about proxies 'user authorization and data cache mechanism 论述了HTTP代理协议的实现过程,并就HTTP代理的身份认证和缓冲机制作出分析研究和探讨
To realize authorization management functions in Product Data Management ( PDM) system and to improve efficiency in authorization query and authorization control during system operation process. In the light of authorization management of function modules in PDM system, role access control model was constructed. 为了实现产品数据管理系统中的权限管理功能,提高系统运行时的权限查询和权限控制的效率,按照产品数据管理系统的功能模块组织权限管理,建立了角色的访问控制模型。
Security service system based on J2EE can satisfy the security need of SCM information platform, such as authentication, authorization, integrality protect of data, confidentiality protect of data and so on. 基于J2EE的安全服务体系可以很好地满足供应链管理信息平台对于认证、授权、数据完整性保护和机密性保护等安全性方面的需要。
The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on. 网络信息安全技术一般包括身份认证、授权控制、审计、数据保密和数据完整性等几个方面。
The fundamental principle and model of RBAC are analysed. Then introduces the fundamental methods of allotting the user roles and role permission. Finally presents an applicable model to realize the user authorization management using RBAC in the data backup system. 文中分析了RBAC的基本思想和模型,然后介绍了用户角色分配和角色许可分配的基本方法,最后提出了在数据备份系统中运用RBAC实现用户权限管理的应用模型。
At last the article gives one example on application model which implements user authorization management based RBAC in data backup system. 文中还给出了在数据备份系统中运用RBAC实现用户权限管理应用模型的实例。
The system architecture is unique in that it combines centralized control with distributed processing. It can support data conversion and integration across an array of heterogeneous ITS subsystems, and control the access level of each subsystem according to its access authorization and the type of data. VCIP结合了集中控制和分布处理的优势,具有开放性,根据访问授权与数据类型控制服务水平,支持跨平台ITS异构数据的转换与集成。
In addition, this paper also discusses several problems such as system security, authorization control, data management in distributed environment and so on. 另外,本文还对系统安全、权限控制、分布环境的数据管理等问题进行了深入讨论。
Legitimate users can use the system as the database system using the same view explicit authorization of the data, but unable to obtain unauthorized information. 合法用户使用该系统可以像使用明文数据库系统一样查看授权的数据,但无法获得非授权的信息。
In the pervasive services, the sharing of credentials is an important part of authorization data flow. 在普适服务中,证书的传递是认证授权信息流的重要组成部分。
It allows authorization data to be shared among virtual domains without the possibility of the impersonation attack. 该协议能够使虚拟域间在不受到假冒攻击的情况下共享授权数据。
In the same time, it provides data information and function interfaces for user of authorization, and user can manage data in database, such as creation, maintenance, accessing and deletion. 同时做到向相应权限的用户提供准确的数据信息和功能接口,使用户可以方便快速地建立、维护、存取和删除数据库中的数据。