助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   安全上下文 的翻译结果: 查询用时:0.465秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
电信技术
更多类别查询

图标索引 历史查询
 

安全上下文
相关语句
  security context
     The system adopts XML-based in-terface describing,service -accessing definition and security context propagation,provides safeguard for key resources within a company and cooperative security service for e-business transaction among partners.
     该系统采用了统一的基于XML的安全数据描述、服务访问接口定义和安全上下文传递; 首次提出了基于SAML的数据交互服务,并以此为基础,构造了协同电子商务安全服务,不仅能够提供以企业为边界的关键资源保护,还可为跨企业的电子商务应用提供协同安全服务;
短句来源
     This paper details how to implement authentication、 authorization、 digital signature、 encryption and secure conversation of message-level web services and how to use security token such as UsernameToken、 security context token X.
     本文详细介绍了实现Web服务消息级别的身份验证、授权、数字签名、加密和安全通信的过程以及各种安全令牌UsernameToken、安全上下文令牌、X.
短句来源
     Group security context is dynamically changed when sensitive events occur.
     安全组具有动态性质,一些安全敏感的事件,如成员关系的变化、密钥的变化等,会引起组安全上下文的改变。
短句来源
     2. Group secure automaton modelSecure group is a set of members that maintain shared group security context.
     参与组通信的成员构成一个安全组,成员共享一致的组安全上下文
短句来源
     Then the design and implementation about security policy of database synchronization module and security context synchronization module are discussed in details. In the discussion the author focus on the research of security framework of DPFS, the arithmetic study and its implementation of those two synchronization modules.
     接着详细地阐述了安全策略数据库同步模块的设计与实现,以及安全上下文同步模块的详细设计方案,其中,DPFS安全框架结构的研究及两个同步模块的详细设计和算法研究与实现是本文研究的重点。
短句来源
更多       
  “安全上下文”译为未确定词的双语例句
     The key techniques in design and implementation of security attribute service are researched based on CORBA specification in this paper.
     以CORBA规范中安全属性服务的内容为基础,给出了安全属性服务的实现架构,提出了安全上下文的验证算法。
短句来源
  相似匹配句对
     SECURITY
     安全
短句来源
     In the different enviroment, the different security context should be performed.
     在不同的情况下,应该使用不同的安全上下文
短句来源
     SECURITY BASE
     安全大本营
短句来源
     Research on Context Environment of Access Control in Web-based Workflow Management System
     基于Web的工作流安全访问控制系统上下文环境研究
短句来源
     A Survey of Context Awareness
     上下文感知综述
查询“安全上下文”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  security context
However, they require too many control packets delivering the security context information to neighbor access points.
      
After connection, the Runtime class ensures that the SA retrieved for the socket corresponds to the security context that it was set to.
      
A security context negotiation is performed during connection setup to determine the requirements of the communication partners.
      
A security context defines the semantic meaning of an identity and its attributes.
      
A Security Context defines what IP addresses, subjects, or groups may access a particular resource directory on the server.
      
更多          


Based on the analysis of secure protocols ( e.g. IPSec. TLSP, etc. ) and secure systems ( e.g. Kerberos, SESAME, etc. ), the concept of generic security service primitives (GSSP) is proposed. Oriented to callers of various protocol layers, GSSP hides the implementation details of the underlying mechanisms. Some terms related to GSSP are defined, and a minimum set of primitives of GSSP is proposed, which includes security context management, security association management, and message encapsulation....

Based on the analysis of secure protocols ( e.g. IPSec. TLSP, etc. ) and secure systems ( e.g. Kerberos, SESAME, etc. ), the concept of generic security service primitives (GSSP) is proposed. Oriented to callers of various protocol layers, GSSP hides the implementation details of the underlying mechanisms. Some terms related to GSSP are defined, and a minimum set of primitives of GSSP is proposed, which includes security context management, security association management, and message encapsulation. Formal specification languages, SDL and MSC, are employed to describe the reference model of GSSP. Finally, an implementation instance of GSSP based on X509 framework is specified with SDL.

基于各种安全协议 (如 IPSec,TL SP等 )和安全系统 (如 Kerberos,SESAME等 )的分析 ,提出了通用安全服务原语 (GSSP)的概念 ,面向不同协议层次的调用者 ,GSSP屏蔽了底层安全机制的实现细节 .定义了 GSSP相关概念和一个最小服务原语集合 ,包括安全上下文管理、安全联合管理、报文封装原语 .用形式描述语言 SDL/ MSC描述了通用安全服务参考模型 .最后用 SDL 描述了一个基于 X.5 0 9框架的实现实例

At present ,the emphases and difficulty of the research on e-Commerce security service is that,how to en-able interoperability between different systems that provide security services among the various Web sites involved in a e-business transaction.In this paper,the authors present a new SAML-based security information exchange service and a cooperative e-Commerce security service system for enterprise application integration.The system adopts XML-based in-terface describing,service -accessing definition...

At present ,the emphases and difficulty of the research on e-Commerce security service is that,how to en-able interoperability between different systems that provide security services among the various Web sites involved in a e-business transaction.In this paper,the authors present a new SAML-based security information exchange service and a cooperative e-Commerce security service system for enterprise application integration.The system adopts XML-based in-terface describing,service -accessing definition and security context propagation,provides safeguard for key resources within a company and cooperative security service for e-business transaction among partners.By providing various appli-cation programming interface,the SAML-based security information exchange service enables the legacy security system interoperate with other SAML-aware systems by simple programming.

如何提高跨企业边界的安全信息互操作性,为电子商务交易提供协同安全服务,是目前电子商务安全服务研究的重点和难点。针对该问题,给出了一种基于SAML的安全数据交换服务和基于该服务的面向企业应用协作的协同电子商务安全服务系统。该系统采用了统一的基于XML的安全数据描述、服务访问接口定义和安全上下文传递;首次提出了基于SAML的数据交互服务,并以此为基础,构造了协同电子商务安全服务,不仅能够提供以企业为边界的关键资源保护,还可为跨企业的电子商务应用提供协同安全服务;基于SAML的安全数据交换服务提供了丰富的编程接口,企业遗留安全系统经过少许编程,就可以在其提供的服务的基础上,实现与其他安全系统间的数据互操作。

The authentication and authorization are analyzed and researched when a 3G user is accessed in this paper. The 3G security system architecture is introduced firstly; then the detailed analysis is made about the process of authentication and authorization for 3G, the process and method of encryption and integrity protection for user's information, and the negotiation mechanism of privacy key, at the same time, the potential vulnerabilities of this mechanism is given; and at last, the mutual security and the conversion...

The authentication and authorization are analyzed and researched when a 3G user is accessed in this paper. The 3G security system architecture is introduced firstly; then the detailed analysis is made about the process of authentication and authorization for 3G, the process and method of encryption and integrity protection for user's information, and the negotiation mechanism of privacy key, at the same time, the potential vulnerabilities of this mechanism is given; and at last, the mutual security and the conversion algorithm of security context for 2G and 3G are classified and anatomized.

对3G用户接入时的认证鉴权进行分析和研究,介绍了3G的安全体系结构,详细分析了3G的认证和鉴权机制和过程、用户信息的加密和完整性保护的过程和方法、密钥协商机制,并指出了3G认证鉴权机制可能存在的缺陷,最后对2G和3G的互通方面的安全性和2G与3G安全上下文之间转换运算的算法进行了分类和剖析。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关安全上下文的内容
在知识搜索中查有关安全上下文的内容
在数字搜索中查有关安全上下文的内容
在概念知识元中查有关安全上下文的内容
在学术趋势中查有关安全上下文的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社