Authentication

Learn about authentication, we have the largest and most updated authentication information on alibabacloud.com

Characteristics of Internet VPN technology

As the architecture in the application layer of the Internet VPN, the system effectively shielded the VPN server network structure, but also shielded the common http://www.aliyun.com/zixun/aggregation/10370.html "> Network attack means, The system accesses the credit network according to the authorization and authentication. More importantly, in the system's client, you can specify a specific application to initiate the connection, connect to the server, complete the application of the agent process, according to this control, the system can block the virus path ...

Kredentials 2.0-pre1 release KDE system Tray Applet

Kredentials is a KDE system Tray applet that maintains the current Kerberos and AFS authentication tokens. Updates the Kerberos ticket and obtains a new AFS token per hour and notifies the user of the final ticket validity period. Kredentials 2.0-pre1 This version has been ported to the KDE 4.x environment. The problem with kredentials is fixed. The old 0.9.x version Branch will continue to support KDE 3.x. Download Address: Http://people.csa ...

Secure cloud computing based on the key of admission certificate

Secure cloud computing based on admission key Liu Yin Fang Wang Jian introduced a secure cloud computing framework. This paper discusses the characteristics of the key mechanism of admission certificate and the main realization in cloud computing, including the distribution of identification key, identity authentication, data exchange and so on. Based on the basic operation, dense cloud computing can also realize the classification of network data extraction and other extended services to meet the needs of large data applications. Secure cloud computing based on the key of admission certificate

Qin: Beware of the "boost" of cloud security in China

The British Standards Association recently after several rounds of deliberation, and finally announced that Ali Cloud Computing Co., Ltd. won the world's first Zhang Security international Gold medal, this is BSI to the global cloud service provider issued the first gold medal. There are several points to the news. One is the authority of authentication. The British Standards Association is a world-leading Business standard service organization, founded in 1901, and in 1929 received the Royal Concession to become the world's first national standards body. At the same time, as one of the founding members of the International Organization for Standardization, BSI has created the world's most trustworthy and widely recognized ISO series of management ...

Download cloud Security is it really safe?

Download cloud security? How do you do it? Furthermore, is it safe to download cloud security? This article will be a simple solution and analysis of this problem, then let us look at the article is how to analyze. Download cloud Security is it really safe? We first look at a message, it is said that 360 security browser built-in download cloud security, through the cloud security technology means, in the file before the completion of the security authentication, at the same time with its system occupancy rate is small, download speed and so on, for users to save a lot of network traffic and download time. Download cloud Security with 360 security browser of other security protection system, together to build a six-layer defense ...

Which is really you: the real name of the social network? Anonymous?

Absrtact: Before I attended a symposium on user focus files (apml,attention Profiling Markup langauge), authentication (OpenID) and data portability, which was 2009, It was just from the time of the anonymous chat that I took part in a file on user concerns (Apml,attention Profiling Markup langauge), authentication (...).

PHP generated Chinese verification code garbled problem solving

PHP generated Chinese authentication code garbled problem solving//will be processed Chinese characters, first from the UTF8 of Chinese characters into an HTML entity form to reuse. Example code://ini_set (' jis-mapped Japanese Font Support ', false); $pic =imagecreate (250,30); $black =imagecolorallocate ($pic, 0,0,0); $white =imagecoloral ...

Elefant CMS 0.9.12-RC release MVC framework System

Elefant is a redesigned MVC framework system in PHP, including a complete and simple new CMS. Elefant main Features and features:-Simple URL routing-secure database extraction and modeling system-default output filter compiled template-Integrated caching system-Flexible input validation (server-side and browser)-Simple table handling -17813.html "> Customizable user authentication-internationalization/localization-CLI support for background tasks-small SCAFFOLDING-reusable application ...

COURIER-MTA v0.66.1 releases excellent electronic mail system

Courier is an excellent electronic mail system, functionally it is far more complete than Qmail, Postfix, etc. we already know, including ESMTP (including identity authentication), POP3, IMAP, fax, Web mail interface, confidential communication (SSL and TLS cover SMTP, POP3, IMAP), a variety of user databases (UNIX® operating system User data files (via PAM (3)), http://www.aliyun.co ...

Research on some theories and key technologies of mixed cloud service security

Research on some theories and key technologies of mixed cloud service security (ph. D.) Zhu Zhiqiang, Wuhan University This paper is based on cloud authentication and on the basis of security requirements such as authorization management, the paper studies the cloud identity management and authentication, authorization management model, cloud infrastructure security and so on, in order to improve the security of mixed cloud service. The specific research contents include: 1. The requirement of user authentication for resource access across the cloud under the hybrid cloud architecture, from the establishment of private cloud based on PKI system ...

Workflow security mechanism of digital ocean cloud computing Platform

The workflow security mechanism of digital ocean cloud computing platform Ranjinyong Xu Lingyu Ding Computing technology has become a more and more concerned way of computer resource delivery. With the development of cloud computing technology, its security problems also face great challenges. Workflow management system is an important part of the "Digital Ocean cloud computing Platform", in which resource authentication and user identity authentication run through all processes of workflow management system. In this paper, the security problems in the workflow process of user management and custom compound model on digital ocean cloud Platform are studied. According to the digital Ocean Cloud Platform user Custom service flow when using public ...

Create a cordial and interesting microblogging image?

Absrtact: In the previous period, the company applied for the certification of Enterprise Micro-blog, every employee of the company is also required to apply for personal authentication to help forward and publicize, the advantages and effects of Weibo I don't say much here, just say, since want to do micro Bo marketing, then the best time before the company to apply for certification of Enterprise Micro-blog, Every employee of the company is also required to apply for personal certification to help forward and publicize microblogging benefits and the role I said here, just say a little, since want to do micro Bo marketing, then it is best to apply for certification, I see a lot of people in the micro-Bo marketing did not add V, this ...

Qingdao software business revenue increased 32.15%

Recently, the municipal Information work led group Office published a list of Qingdao E-commerce demonstration Enterprises, Qingdao Commodity Trading Center Co., Ltd. and other 14 enterprises to obtain the title of the Model enterprise. In recent years, the Qingdao Electronic Commerce Foundation system gradually consummates, the security, the authentication, the payment and so on each common support technology integration and the application is maturing, is expected 2013 the whole city electronic commerce turnover more than 150 billion yuan. At the same time, the reporter also learned that 1 ~ November Qingdao software industry to achieve software business income of 64.53 billion yuan, an increase of 32.15%, higher than the province 1~1 ...

PHP +mysql User Login Authentication Code

This is a simple user login verification code Oh, more suitable for beginners in PHP tutorial Oh, let's look at the HTML code <form action=111cnnet.php > <input type=text name=username > <input type=text name=password> <input type=submit Name=password ...

Kronolith H4 (3.0.9) Publish the Tribal Calendar tool

The Kronolith H4 (3.0.9) version fixes the snoozed alert issue for event output. Kronolith is a tribal calendar tool that provides a stable and unique calendar system with integration and scheduling features. Enables the extensive use of tribal frameworks to provide integration with other applications. It implements a reliable, stand-alone calendar system that supports repetitive events, all-day events, custom fields, keywords, shared calendars, free/busy information, and manages multiple users through tribal authentication. Software Information: http://w ...

GROUP-E V1.725RC3 release collaboration software integration components

GROUP-E is an Office collaboration system that integrates software collaboration, project and business management. The solution was developed based on lamp (Linux, http://www.aliyun.com/zixun/aggregation/14417.html ">apache, MySQL, and PHP)." GROUP-E provides project management, transparent Samba (file server) integration, LDAP based user management and single sign-on authentication. GR ...

The revolutionary evolution of PKI towards PKI 2.0

"51cto.com comprehensive report" PKI (public Key Infrastructure) technology has even surpassed the time of Internet existence. Whether you notice it or not, you may be using a certain part of your PKI technology every day. The scope of use of digital certificates includes SSL, VPN to B-to-b data exchange and electronic passports. Public-key cryptography is a proven technology for generating digital certificate security, and it is now entering its next phase of transformation. The public key has evolved beyond the architecture and extends around us for identity authentication and cryptographic applications. Security can be based on the actual environment ...

Windows Azure AppFabric Introductory teaching series (IV): Introduction to SWT and OAuth wrap

This article is the fourth article in the introductory teaching of Windows Azure AppFabric. We know that the access Control service in AppFabric uses SWT and OAuth WRAP in the authentication process, so in order to better understand the internal principles of ACS, we will briefly introduce the SWT and OAuth WRAP protocols in this tutorial. Simple Web Token (swt) SWT Introduction: Simple Web Toke ...

Research on application of grid file storage in cloud computing environment

Research on the application of grid file storage in cloud computing environment Liu Youan, Roming the grid storage hierarchy and designed the prototype of network file storage System, aiming at the growing problem of massive file data management in Internet application. This paper compares the similarities and differences of cloud storage and network storage, designs the data storage process of grid file based on security authentication, uses name service to solve the problem of unified view of grid file, and uses redundant storage strategy to solve the problem of data storage reliability. Compared with traditional data center mode storage structure, the new system has higher availability. This storage application can be used for data management in energy power systems and ...

Research and implementation of cloud computing security technology based on HDFs

Research and implementation of cloud computing security technology based on HDFs the Guo San Changbenwen innovation of Guangdong University of Technology is as follows: (1) based on the principle of Ibe algorithm, the Datanode authentication security mechanism of client access under HDFs is designed, In order to make up the original HDFS architecture under the client Access Datanode has not been certified defects, so that malicious or counterfeit users can not go through the main server Namenode to steal the private data on the Datanode to ensure data security. At the same time, using the principle of class Ibe algorithm,...

Total Pages: 19 1 .... 3 4 5 6 7 .... 19 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.