Authentication and Authorization
基本解釋
- 鑒別與授權(quán);驗(yàn)證和授權(quán)
英漢例句
- Authentication and Authorization security.
認(rèn)證和授權(quán)安全。 - At a high level, we apply authentication and authorization rigorously.
在高級(jí)別上,我們嚴(yán)格應(yīng)用身份驗(yàn)證和授權(quán)。 - You can also set authentication and authorization configuration for XML management.
您還可以為 XML 管理設(shè)置身份驗(yàn)證和授權(quán)配置。 - Services being deployed include identity management, authentication authorization, business services, application services, and reporting services.
FORBES: Justice Department CTO: Brokerages are Future of Government Cloud
雙語(yǔ)例句
權(quán)威例句
詞組短語(yǔ)
- Authentication n and Authorization 認(rèn)證和授權(quán)
- Authentication and Authorization Function 鑒權(quán)和授權(quán)功能
- Pluggable authentication and authorization 可插入身份驗(yàn)證和授權(quán)
- Peer Authentication And Authorization 對(duì)等認(rèn)證和授權(quán)
- declarative authentication and authorization 聲明式的權(quán)限管理
短語(yǔ)
專(zhuān)業(yè)釋義
- 認(rèn)證與授權(quán)
A instance enunciates functions of Acegi’s seven importance discretenesses,and instructs elaborately the course of Acegi’s authentication and authorization.
通過(guò)一個(gè)實(shí)例闡述了Acegi7項(xiàng)重要組件的作用,并詳細(xì)說(shuō)明了Acegi安全框架認(rèn)證與授權(quán)的過(guò)程。 - 認(rèn)證授權(quán)
For a web application system, improving the authentication and authorization mechanism is very important.
對(duì)于一個(gè)Web應(yīng)用系統(tǒng)來(lái)說(shuō),完善的認(rèn)證授權(quán)機(jī)制是十分重要的。 本文就Spring框架下的Acegi安全架構(gòu)技術(shù)進(jìn)行了分析、探討,并給出了相應(yīng)的解決方案。 - 驗(yàn)證和授權(quán)
The identity trust concerns mainly the authentication and authorization.
身份信任主要考慮的是用戶(hù)身份驗(yàn)證和授權(quán)訪(fǎng)問(wèn)。 - 驗(yàn)證與授權(quán)
The security needs concentrate on five facets: confidentiality, authentication and authorization , integrity and non-repudiation. Combined with these specific requirements of security, correlative techniques was discussed such as data encryption and digital signature.
在詳細(xì)分析針對(duì)Web服務(wù)的一些攻擊方式的基礎(chǔ)上,總結(jié)出針對(duì)Web服務(wù)動(dòng)態(tài)、靈活和可擴(kuò)展等特點(diǎn)的特殊安全性需求,集中體現(xiàn)在機(jī)密性、完整性、驗(yàn)證與授權(quán)、原始性證明和不可否認(rèn)性五個(gè)方面,結(jié)合這些特殊的安全性需求,分析了滿(mǎn)足這些安全性需求的安全技術(shù),如數(shù)據(jù)加密、數(shù)字簽名等。 - 鑒別與授權(quán)
- 認(rèn)證與授權(quán)