One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key ( from a proof-of-possession token). 演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
The order authorized financial and travel sanctions against anyone participating in online attacks that posed a threat to the national security, foreign policy, or economic health or financial stability of the United States. 该命令授权对任何参与网络攻击、进而对美国的国家安全、外交政策、经济状况或财政稳定构成威胁的人进行财务和旅行方面的制裁。
While this means maintaining an inventory of authorized cards, it provides a reasonable security enhancement. 尽管这是指维护授权卡的库存,但它提供合理的安全增强。
The director or any authorized person may remove from within any part of a restricted area any vehicle which in his opinion constitutes through its presence a risk in regard to security or safety of the airport or a danger to any person. 处长或任何获授权人员如认为任何车辆的存在对机场保安或安全或对任何人构成危险,则可从禁区任何部分移走该车辆。
He is appointed or authorized to secure for the people the, in many ways, limited ends of peace and security. 他是由人民任命并授权,让他行使权力保卫人民的安全,保卫来之不易的和平。
Authorized users are responsible for the security of their passwords and accounts. 授权用户负责保证他们账户和口令的安全。
The authorized capital system stresses the efficiency and legal capital system stresses security. 授权资本制偏重效率,法定资本制偏向安全。
These authorized rules have considered the user attribute and the enterprise security policy. 这些授权规则考虑了用户属性和企业安全策略。
We must make sure the confidential data are not only stored separately in a certain region, but also used by authorized users of outside. This technique is named security isolation and information exchange technology, also called GAP. 我们既要保证涉密信息是被隔离地保存在特定的区域内,又要使其能被获授权的外界用户所使用,这种技术被称为安全隔离与信息交换技术,又叫做GAP。
Based on the research of request/ response model of HTTP protocol, session tracking and processing technology is used to implement access only to authorized users, and policy of resource access control and form-based authentication are combined to implement the security manager module in the system. 系统通过对HTTP请求/响应模刑的研究,采用会话跟踪和处理来实现授权访问,并采用资源访问控制和基于表单的认证相结合的方式实现系统管理模块的安全性。
PMI based authorized management infrastructure application can effectively increases system security, reduces the chaos caused by multiple privilege management model, lower application system development cost, increases enterprise efficiency. 基于PMI授权管理体系应用能够有效地增强系统的安全性,改变现有的多种权限管理模型带来权限管理混乱,降低应用系统的开发成本,提高企业的效率。
Various authorized function to ensure the security of different sub-unit; 丰富细致的授权功能,基本能够满足各单位对系统安全性的要求;
To prevent these implied forbidden permissions from being authorized to the user later and to reinforce RBAC's security, it is necessary to introduce explicit negative authorization in RBAC. 为了防止被隐含禁止的权限将来授权给用户,增强RBAC的安全性,引入显式的负授权是有必要的。
Among them, collective self-defense and the authorized use of force are important means to fight the regional hegemony and keep the international peace and security in time and effectively. 其中,集体自卫和授权型运用武力对及时有效地反对地区霸权主义、维护国际和平与安全具有重要意义。
The authorized management model expands and improves RBAC in the following aspects: security level of authorization subject and object, role structure and authorization inheritance, authority categories, authorization and restraint. 文中提出的授权管理模型在授权主客体的安全级别、角色结构及授权继承性、权限类别及授权约束机制等方面对RBAC进行了扩充,使之更完善。
While only those with the competence of the management system can access such sensitive data, no authorized users are not allowed to use the system. This fully protects security of the system. 同时只有拥有该系统管理权限的工作人员才能接触此类敏感数据,没有经过授权的用户不能使用该系统,充分保障了系统的安全性。
The system provides good security in the fashion of multilevel authorized system and use encryption algorithm to encrypt data to guarantee the system security at the same time. 采用多级授权方式,利用加密算法对数据进行加密,提高了系统的安全性。
By the end of the office of internal and external network physical segregation, with the external web server web server, within the network information step-by-step authorized cases on the internet and network exchange of information and security. 通过办公终端的内外网物理隔离与信息的安全加密,内网信息在逐层授权情况下上载外网,实现内外网信息的安全交流。
Based on it, presents the access control model of authorized service platform, which consists identity authentication, privilege management and security audit. 在此基础之上,提出并实现了包括身份认证、权限管理和安全审计在内的授权服务平台的访问控制模型。
As Body Area Network collects and transmits health data which is sensitive and private information, allowing only authorized entities to access. Therefore, with research and development of BAN, the security of BAN should be priority. 由于体域网收集和传送的健康数据是敏感和隐私信息,只允许授权的实体访问,因此,在BAN研究和发展中,保证BAN的安全性是应该优先考虑的问题。