| 1. | Well - known signers are called certificate authorities 众所周知的签署者被称为证书授权方( ca ) 。 |
| 2. | These self - signed certificates are no less secure than certificates signed by a certificate authority 自签署证书的安全性不亚于通过证书授权方签署的证书。 |
| 3. | In this thesis the attribute certificate authorization mechanism of the pmi is thoroughly investigated 本文的主要工作便是对pmi系统中涉及的具体属性证书授权机制进行深入的研究与探讨。 |
| 4. | Although you can get a certificate from a certificate authority , for the examples here , you ll act as your own ca 尽管可以通过证书授权机构( ca )得到一份证书,但是在这里的例子中,你将充当自己的ca 。 |
| 5. | With the digital signature , document integrity can be guaranteed while documents protected by i . secure office can be shared with others safely 此外, i . secureoffice亦可利用数码证书授权其他人共用或分享机密文件档案。由于i |
| 6. | For e - cert ( encipherment ) - by the authorised representative of the organisation ; for e - cert ( server ) - by the authorised representative of the organisation 电子证书(保密) -其机构获授权代表或作为证书授权单位在证书上列出其名称之单位; |
| 7. | For e - cert ( organisational ) bank - cert ( corporate ) - by the authorised representative of the organisation or the person whose name appears on the certificate as the subscriber of that certificate 电子证书(机构)银行证书(机构) -其机构获授权代表或作为证书授权用户在证书上列出其姓名之人士; |
| 8. | Abstract : according to the basic rules of network management , this paper describes the essential functions of how to monitor certificate authorities in a distributed certification system at real time , then proposes the implementation model and internal protocols 文摘:根据网络安全管理的基本原则,阐述分布式证书系统证书授权机构实时监控的基本功能,提出实时监控的实现模型和内部协议。 |
| 9. | This paper has analyzed the pkix ( public key infrastructure based on x . 509 standard ) digital certificate authority mechanism , and has discussed the espkix , a platform independent and java implemented essential pkix , and its implementation . it covers the design thought in the phases of certificate request , issuance and revocation 本文分析了基于x . 509标准的公钥基础设施( pkix )数字证书授权机制,对使用java语言设计和实现跨平台的简化版pkix ? espkix ( essentialpkix )进行了深入的讨论,涉及espkix系统中证书的请求、颁发和撤消等各个阶段。 |
| 10. | In the last part , a simple pmi privilege transaction model is proposed based on the authorization mechanism and its architecture components , system operation and some technical considerations in the design process are discussed . theories and implementation standards of pmi system have been further developed in this thesis , which is helpful to constructing a pki system with secure and efficient privilege management infrastructure 本文通过对pmi属性证书授权机制实现过程的设计和具体特权处理模型的构建,进一步丰富和发展了pmi系统的相关理论和实施标准,为最终建立一个具备安全高效特权管理普适性平台的pki系统奠定了坚实的基础。 |