| 1. | A commonly agreed - upon method of negotiating authorization is also needed 得到普遍遵守的协商授权机制也是很必要的。 |
| 2. | It also provides an authorization mechanism for a user by means of signed certificates 它还通过签名证书为用户提供了授权机制。 |
| 3. | In this thesis the attribute certificate authorization mechanism of the pmi is thoroughly investigated 本文的主要工作便是对pmi系统中涉及的具体属性证书授权机制进行深入的研究与探讨。 |
| 4. | The first is a time - based authorization mechanism and the second is the ability to be further expanded by other macros and code 第一个特性是基于时间的授权机制,第二个特性是能够由其他宏和代码进行进一步扩展。 |
| 5. | This is because resources have jndi names that can be looked up by any application , and there is no authorization on resource access 这是因为资源具有jdni名称,而此名称可以由任何应用程序进行查询,并且资源访问上没有授权机制。 |
| 6. | Explicit authorization ( briefly ea ) mechanism has many excellent security properties and is capable of preventing information stealing and destroying attack 显式授权机制具备很好的安全性质,能有效地防御信息窃取和破坏攻击。 |
| 7. | Software system modeling is another key content of this dissertation , which incarnates the explicit authorization mechanism completely and definitely 软件系统的建模是这一部分的重点内容,它更加完整明确地体现了显式授权机制的应用。 |
| 8. | The research of this dissertation focuses on constructing a trusted secure storage ( briefly tss ) system based on the ea mechanism and its simulating implementation 本文在提出显式授权机制的基础上,构建了一种可信安全存储系统tss ( trustedsecurestorage ) ,并对其进行了模拟实现。 |
| 9. | The time - based authorization mechanism is merely an example of how multiple types of constraints can be added in to this mechanism ; the expansion option will be used in a later example 基于时间的授权机制只是作为例子,说明如何在这种机制中添加多种约束;扩展选项将在以后的例子中使用。 |
| 10. | 2 . adopts the ca authentication mode , and combines the user certificate and role based access control , which enhances authentication and simplifies the way of access control 采用了基于ca证书的身份认证方式,并将用户证书和角色授权机制结合起来,既严格了身份认证又简化了权限管理。 |