合法用户

  • 网络legitimate user;valid users;Validate user
合法用户合法用户
  1. 该方案能阻止非法用户的入侵,防止合法用户越权访问;

    So the invalid users can be held back , and the exceeding access of valid users can be prevented .

  2. 该模型通过群签名机制对合法用户签发授权票据,以此进行访问控制。

    The model adopts group signature mechanism to sign and distribute granted tickets for valid users as credentials to access control .

  3. 校园网IP地址的盗用给合法用户带来了很大的不便。

    IP address usurping on the campus intranet has caused great inconvenience to legal users .

  4. 其他的一些法律纠纷的缘由则是spider和scraper所占用的带宽影响了合法用户的使用。

    Other lawsuits claim that the bandwidth taken by the spiders and scrapers detracts from legitimate users .

  5. 通过对合法用户登录信息进行MD5加密,保证了系统的安全性。为了便于用户之间的信息传输,系统采用了P2P网络传输方式。

    In order to facilitate information transferring between users , the system uses the P2P network transmission way .

  6. DoS攻击就是利用合理的服务请求来占用过多的服务资源,从而使合法用户无法得到服务。

    Denial of service utilizes reasonable service request to occupy more service resource , which make the legal user not get service .

  7. 然而,为了保护出版商的权益以及电子访问对象的版权,出版商对单位合法用户的往往是采取IP地址认证方式进行身份认证,对其进行电子访问对象的授权。

    However , because of publishers in order to protect its rights and interests of copyright and electronic access object on a large-scale units authorized user authentication are generally taken by IP address authentication .

  8. 采用了SOCKSv5代理协议,使合法用户能够穿越防火墙来保证文件传输的透明性。

    It also adopts proxy protocol of Socks V5 so as to ensure the validated users to transfer file transparently through AFT.

  9. 当前的DDoS防御系统误警率相对比较高,对合法用户造成了很大的影响。

    The current DDoS defense system has relatively high false positive rate , as a result , it affects legitimate users seriously .

  10. 该方法利用一阶齐次Markov链对网络系统中合法用户的正常行为进行建模,将Markov链的状态同用户执行的shell命令序列联系在一起,并引入一个附加状态;

    The method constructs a one-order Markov chain model to represent the normal behavior profile of a network user , and associates shell command sequences with the states of the Markov chain .

  11. CLC检查用户数据库并为合法用户创建一个新的对话。

    CLC checks it with the user database and creates a new session for valid user .

  12. DDOS攻击是互联网最有威胁的攻击方式之一,它轻则阻止服务器为合法用户提供正常服务,重则瘫痪整个互联网。

    DDOS attack is one of the most dangerous threaten on the Internet . As minor as , it can prevent legitimate user to provide normal service .

  13. 特别是,校园网络的资源是很有限的,时常会存在盗用IP地址的情况,这样就给网络管理员和合法用户带来大量的麻烦。

    This is especially so in the case of IP address resources in the campus network systems , which is limited in numbers , where illegal use of IP addresses often occurs . This has caused many problems to the users and network administrators .

  14. 在基于角色访问控制的基础上,利用DBMS的审计功能,将用户审计信息与实际的权限管理信息相比较,从而侦测出内部合法用户的滥用行为。

    On RBAC , using the audit function of DBMS , by comparing user 's audit to the authorization administration information , this System can detect user 's misuse behavior to DBMS .

  15. 数据分析模块根据用户管理信息库中的合法用户信息,按IPMAC、IPPORT或IPMACPORT管理方案对采集到的数据进行分析,查找出进行IP盗用的用户,并追踪定位出其具体位置;

    Data analyzing module uses IP-MAC , IP-PORT or IP-MAC - PORT management methods to analyze the collected data , finds out IP address embezzlement users and locates their sites , according to the legal users ' information stored in User Management Database .

  16. VPN是远程网络访问的一种安全、经济的技术手段。如何依托VPN技术,解决使用非校园网IP的合法用户远程访问图书馆电子资源问题,值得关注和探讨。

    VPN is a secure and economic technical means for remote network access , and with this method , legal users can access the digital resources of library with off-campus IP , so it deserves to be concerned and discussed .

  17. PMI是一个新的信息保护基础设施,能够与PKI和目录服务紧密集成。PMI作为一个基础设施,能够系统地建立起对合法用户的特定授权。

    PMI is a new infrastructure of protected information based on PKI , can integrate compactly with PKI and LDAP and can establish systemically special authorization of legitimate users . names of people and places ;

  18. PDM系统客户端用户身份的识别与验证是PDM系统安全的门户,合法用户的权限分配与管理是PDM系统信息安全的关键。

    The identification and verification of user 's status in PDM system is the PDM system 's safety of gate , the operation legal right allotment and managements of the legal customer are the keys of the PDM system safety .

  19. AMIDS模型应用数据挖掘聚类技术对合法用户命令数据进行分析处理,提高了用户模式表示的准确性和灵活性;

    AMIDS analyses and deals with true users ' command data through clustering technology to improve user profiles ' agility and validity ;

  20. 认证机制是为合法用户提供安全保障。

    Authentication mechanism is to provide security protection for legal users .

  21. 抗拷贝攻击和提供合法用户认证的混合水印研究

    Research on Hybrid Watermarking Resilient Against Copy Attack and Authenticating Legitimate Customer

  22. 合法用户校外访问图书馆电子资源方式探究

    A study of off-campus lawful user access to library 's electronic resources

  23. 校外合法用户远程访问图书馆电子资源研究

    Study on Lawful Uses Off-Campus Access to Library Electronic Resources

  24. 您不是此数据库的合法用户。

    You are not a valid user in this database .

  25. 一种有效的识别合法用户的方法

    An effective method of to distinguish legal users

  26. 实验结果证明合法用户的计算复杂性有了显著降低。

    Experimental results show that the legitimateusers ' computational complexities have been significantly reduced .

  27. 只有合法用户能访问服务(包括拒绝欺诈阴谋)

    Only legitimate users can access the services ( including the denial of spoofing schemes )

  28. 美国大学合法用户在校外利用图书馆电子资源的访问方式调查与研究

    The Survey and Study on Ways of Off-Campus Access to E-Resource in American University Library

  29. 所以在你实现安全措施的时候,留心合法用户的反馈是很明智的。

    It is wise to be mindful of your legitimate users as you implement security measures .

  30. 这使假冒的用户很容易模仿合法用户。

    This makes it very possible for a fake user to imitate as a valid user .