Public Key Infrastructure:Study of Certificate Status Information Distribution Method and System Design
A New Certificate and Public Key Infrastructure
Some Figures of Speech in First Certificate in English Course
THE CONSIDERATION ABOUT TO CARRY OUT THE SYSTEM OF CONTINUING EDUCATION CERTIFICATE
On Education of Higher Professional Certificate
Application on Pipe Quality of Certification with Visual FoxPro6.0 Software
Visual FoxPro6.0软件在钢管质 证书中的应用
Certification UNI-EN 29001 for Sperotto Rimar
Thirdly, according to the standards of digital certificates and ECC, design the data structures of ECC keys, PKCS#8 private key, PKCS#10 certification request, X.
然后,依照数字 证书和ECC密钥相关标准规定,设计出ECC密钥、PKCS#8私钥、PKCS#10 证书申请、X.
NARTE Certification in China
Building of the Key Management Based on X.509 Certification
Access Control Model for Web Services Based on SPKI/SDSI Certificates
Network Files Access Control Using SPKI/SDSI Certificates
Implement Certificates Distribution of CA Based on B/S and C/S Mode
The current grid security standard GSI(Grid Security Infrastructure) adopts PKI(Public Key Infrastructure) based on certificates and restricts the scale of grid.
当前的网格安全标准GSI(Grid Security Infrastructure)采用了基于 证书的PKI(Public Key Infrastruc-ture),对网格的规模有所限制。
A Hidden Credential Based Automated Trust Negotiation Model
It is the natural trend to introduce the professional credential system and carry out the system of laying equal stress on academic credential and professional credential in the development of higher vocational education.
推行职业资格 证书制度,实行学历 证书与职业资格 证书并重制度是高等职业教育发展的必然趋势。
509 certificate as basic credential for authentication and authorization. We also define the described method of security credential and policy as the foundations of trust relationship evaluation.
The Research of Security Architecture and Credential Management for Grid
Based on the GDSS-PKI system, this paper describes the implementation of both the cross-domain credential mechanism and the cross-domain authentication in detail.
然后,针对GDSS-PKI模型,详细说明了GDSS-PKI系统中的域 证书结构、跨域信任机制以及认证过 程的实现方法。
我想查看译文中含有： 查询“证书”译词为用户自定义的双语例句 的双语例句
A procedure for determining cobalt(II) in potable and natural waters was developed and certified ( certificate no.
A " certificate" form that reflects the unique characteristics of each cultivar studied is proposed.
A form of the certificate registered officially for calibration blocks that were subjected to metrological certification is presented.
Novikova, Composition to Fabricate Film Photoresistors, Author's Certificate No.
Therefore, inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper.
Forecasting the Laws of Distribution of the Conveyance and Certification Times for Storekeeping
Consideration was given to forecasting the dynamics of the distribution laws of the times of commodity conveyance and certification in the wholesale storekeeping systems.
Mathematical models of the dynamics of conveyance and certification times were formulated, and the optimal methods of forecasting were substantiated for them.
This method is used for the certification of PWO scintillation crystals in their mass production.
Specific features of the certification of large-diameter devices are pointed out, and a new method for certifying such sensors is expounded.
As an object of intellectual property, the work is protected by two patents and two inventor's certificates.
The cause of death was determined by reference to death certificates and coroners' inquest records.
Psychiatric disorders certified on death certificates in an English population
Data sources of 5,712 SCD were death certificates and questionnaires from the physicians/coroners; data of 4,976 MI patients from 17 regional hospitals were gathered by patient interview and chart review.
509 attribute certificates to define trust domains, roles to define controlled activities, and role delegation across domains to represent permissions to these activities.
CMM: Credential migration management system based on trusted computing in CGSP
But the original user may be under the risk of information leakage and identity abused for sending his credential to remote computing environment.
Existing grid security practice has few means to enforce the security of credential delivery.
With TC using an essential in-platform (trusted) third party, Trusted Platform Module (TPM), we can use TC to protect the user credential.
In this paper we present credential migration management (CMM) system, which is a part of Daonity project, to manifest migrating credential in security between different computers with TPM.