Authentication and network access control system verifies users legal identity and authorizes network resources access.
身份认证与网络访问控制验证用户的合法身份,授权网络资源的访问。
Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.
入网访问控制是保证网络资源不被非法使用, 是网络安全防范和保护的主要策略。
After analyzing the excessive filtering rules, a solution to increase the performance of network access control equipment is proposed.
分析过量规则对网络访问控制设备性能的影响,讨论针对这一问题的解决方法。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.
中央工具在单一位置存储整个网络的用户标识和访问控制信息,并提供用于进行全面管理的界面。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
Information gathered by social network applications needs to be protected by policies which control access to information.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
Access control can be externalized to a network proxy instead of being performed within the local app.
访问控制可以外化给网络代理,不用再在本地应用里执行。
For example, you need to control access to EJBs using a network-safe encrypted token.
例如,您需要使用网络安全加密令牌控制对ejb的访问。
How do we ensure that all people, especially the poor, have access to the global network, have some control of the network, and can gain local benefits from being a part of the network?
如何能保证他们也能在这个网络中占一席之地?也能作为这个网络中的一部分而得到地区性好处?
Repeat the same process for a control channel adapter for redundancy, but do not select the Access External Network check box.
对于冗余控制通道适配器,重复相同的过程,但是不选中AccessExternalNet work复选框。
For example, it's hard to use correctly, root users can still escape from it, and it doesn't control network access at all.
例如,它难以正确使用,root用户还是可以从中脱离,而且它根本不去控制网络访问。
In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.
图2的中心展示的是Tivoli的WebSEAL产品,该产品充当代理的角色并提供安全机制来控制对网络中的文档以及Web对象的访问。
In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.
在当前以网络为中心的业务模型中,验证个人身份、控制访问和维护数据的完整性与保密性变得越来越难。
Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.
可以通过策略实现安全措施(包括对部分网络的访问)或控制服务质量。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
It control what users can log on to the server and access control of the cyber source, user access time and network in which workstations.
它控制哪些用户能够登录到服务器并获取网络资源,控制用户入网的时间和在哪台工作站入网。
At last, some key technologies of new generation Internet are discussed, such as access control, trustworthy route, quality of service, multi-homing and network management.
并对新互联网体系中的接入控制管理、可信路由及服务质量、多流传输、网络监测管理等关键技术进行了研究和探讨。
By the analysis and test of the filter performance of the Internet access control Equitment AR2000, we research how it influence the efficiency and flux of the network.
通过对互联网访问控制设备AR 2000的过滤性能的分析测试,研究其对网络效率和流量的影响。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
Based on the system requirement analysis, it designs the main function to finish the network contents access control.
对网络内容访问控制系统进行需求分析,设计出主要的功能模块,以完成基本的网络内容访问控制功能。
Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.
访问控制是网络安全的一个重要组成部分,在保障电子政务信息的完整性、保密性和可用性方面发挥着重要作用。
Access control list can be used to filter away dangerous packets and give some level of protection to the network.
访问控制列表能够过滤掉网络中的有害报文,给网络提供一层相对安全的保护。
Monitor and configure your network, adjust communications and diagnostic parameters to control how and where data travels and who has access.
监测并配置网络,调节通信系统并诊断参数,以此来控制数据通过何种方式传输到哪里,以及谁访问过。
Based on the safety requirement of network environment, the related access control has been researched in this dissertation.
本文针对网络环境的安全需求,对访问控制进行了相关的研究。
CORBA technique is used in network communication for remote access and control between central control station and monitoring instrument in isomeric environment.
网络通信中采用CORBA技术实现异构环境下中心控制站与各监测仪之间的远程访问和控制。
We designed a media access control (MAC) protocol for ATM based passive optical network (ATM-PON).
针对基于AT M的无源光网络(atm -PON)设计了一种媒质接入控制(MAC)协议。
The network Auditing System usually used to implement the user authentication, access control, log recording and other functions such as flow charge in a large network.
网络审计系统广泛应用于园区网络,实现园区网络内的身份认证、访问控制、日志记录以及流量计费等功能。
The network Auditing System usually used to implement the user authentication, access control, log recording and other functions such as flow charge in a large network.
网络审计系统广泛应用于园区网络,实现园区网络内的身份认证、访问控制、日志记录以及流量计费等功能。
应用推荐