帮忙翻译成计算机的英文啊,要专业点的 帮忙翻译成英文?专业点的

作者&投稿:郝健 (若有异议请与网页底部的电邮联系)
单点登录(single sign-on)既是安全解决方案,也是增加系统可用性的解决方案。单点登录的孕育是因为在目前的计算机应用中,针对如此多的应用,人们普遍拥有太多的身份识别信息(用户名)以及太多的认证信息(密码)。
Single Sign-on

Single sign-on is not only a safe solution but also a solution that can increase system availability. In view of so many current computer applications that computer users generally have too much identification information (username or user ID) and too much authentication information (password), single sign-on comes into being.

单点登录的存在不是基于安全技术层次的原因,而是因为用户的行为,使得单点登录不得不存在。如果对于每一个应用或数据库,用户的身份识别信息各不相同,密码也各不相同,那么用户就必须拥有超凡的记忆力才能记住如此多的身份识别信息和密码。用户管理如此多的用户名和密码的惟一的方法是把这些用户名和密码写在一张纸上,这虽然比把用户名和密码放在他们自己的脑袋中要省事得多,但是却大大增加了安全风险。
The existence of single sign-on which has to come true is not because of the level of security technology, but due to users' behaviour. Regarding each application or database, because users' identifiable information varies from person to person and so do passwords, users must have exceptional memories to remember so much identification information and so many passwords. Although the only way that users manage so many usernames and passwords is to take them down on paper, which is much more convenient than to keep them in mind, it greatly increases security risk.

解决这个问题的一个方法,就是把所有的用户名以及(或)密码都设置成相同的。虽然这样可以解决需要记忆众多用户名和密码的问题,但却让计算机环境的可用性降低。一遍又一遍地输入用户名和密码是很枯燥的任务,尤其是当需要输入包含很多字母、数字、标志符的高强度密码时,情况更是如此。
One way of solving this problem is to identically set all usernames and passwords. Although the problem is solved, the availability of the computer environment is reduced. It is a dull job to enter usernames and passwords again and again, especially in the case of entering the high-intensity password which contains a lot of letters, figures, and signs.

因此,正如其名字所示,单点登录将使得计算环境更加可用。也就是说,用户仅需要认证他们自身一次,而不管他们需要访问多少次的应用。这样也可以维护良好的安全性,因为用户只有惟一的用户名和密码。密码的管理也很简单,因为密码仅需要被更改一次,而不管有多少的应用。

Therefore, as what its name implies, single sign-on computing environment will be more available. That is to say, a user needs to authenticate one's own ID only one time, regardless of how many times one needs access to applications. Thus users can use exclusive ID to maintain a good security. With easy management of ID, which is only changed once, users can have unlimited access to applications.

可以有很多方法实现单点登录,根据用户提供的识别信息的不同,各方法有很大不同,而且用来完成单点登录这一任务的方法也各不一样。目前使用最为广泛的是Kerberos、DCE和基于PKI的方案。单点登录的实质是确保其一致性,不管如何具体实现,目的则是在一个应用与另一个应用之间安全地传播用户的识别信息,从而不会每次都让用户费心。当正确使用后,单点登录既可以提高可用性,又是安全的解决方案。
There may be many ways to sign in with single sign-on. According to different information users provide, the ways differ from one another and the way to finish single sign-on also veries from person to person. At present, the most widely used way is Kerberos, DCE and the PKI-based program. The essence of sigle sign-on is to guarantee the consistency, regardless of how to concretely realize it, aimed at disseminating the user's identification information safely in one application and another so that each time the user will not need to take a lot of trouble. When used correctly, not only can single sign-on improve the availability, but it is also a safe solution.

单点登录并不是缺乏挑战的。当试图组合由不同商家提供的平台和产品时,就面临着实现可实用的单点登录这一挑战。使用既定事实的或工业的标准,例如Kerberos和PKI,则有助于解决互操作问题。
Single sign-on does not have lack of challenges. When platforms and products provided by different businesses are tried to combine, single sign-on is faced with the challenges of practical realization. The use of the standard of an established fact or the industry, for example, Kerberos and PKI, is very helpful in the solution of interoperability.

当用户登录他们的单点登录环境,并离开从而留下开放并经过认证的终端时,会产生单点登录的安全风险。此时,如果有恶意的用户或好奇的同事决定对这开放的、并经过认证的终端探究一番时,很可能就是一场灾难。他们不仅仅只是得到一个应用的授权,而是得到了所有应用的授权。
When users log on their single sign-on environments, and then leave and let open the certified terminal, the security risks of single sign-on will take place. During this time, if a user with evil intention or a curious colleague is determined to probe into the open and certified terminal, probably it will be a destruction. They obtain not only one authorized application but all ones.

可以有几个方法解决上述问题:首先,用户应该在离开计算机系统前有意识地锁定计算机;其次,计算机应该被设置为在空闲一段时间后能自动锁定;最后,单点登录的服务可以让不活跃的对话超时退出。使用上述三个方法,提供了深度防御的保护,从而确保安全风险不会真正产生实际的安全事故。
There are several ways to avoid the above problems. Firstly, when the user leaves one's computer system, one should lock the computer system consciously. Secondly, the computer should be set to lock itself automatically after a period of idle time. Finally, the service of single sign-on can make the inactive conversation overtime and exit. With the above three ways used and defense-in-depth protection provided, security risks are ensured to be unable to produce the actual security accidents really.

与认证用户同样重要的是让用户退出认证的能力。为了确保其他用户不能进入闲置的已经通过认证的计算机,并重用经过认证的会话,给予用户登出系统的能力也是非常重要的。监测用户已登出单点登录系统环境是简单、有效的方法,可以确保部署的单点登录方案不会被那些未授权访问者、窃贼或数据破坏者利用。
It is equally important for the authenticated user to have the right to exit from the certification. In order not to allow unauthenticated users to probe into the certificated computer, it is very important to reuse the certified conversations to authorize the user the ability to log off the system. It is a very easy and effective way to monitor a user who has exited from the single sign-on system. By monitoring the user of single sign-on, the deployment of single sign-on program will not be made use of by unauthorized visitors, burglars or data destroyers.

对于数据窃贼来说,集中的单点登录服务将是他们最优先的目标。如果单点登录服务的信息被窃取或泄露,那么黑客就可能获取关于用户的一大堆的敏感且有价值的信息。确保部署有效且成功的单点登录的关键因素,是保护对服务以及服务内部的访问,并满足高效的需求。
Regarding data burglars, the mass single sign-on services will be their highest priority objectives. If the information of single sign-on service is stolen or revealed, hackers will obtain a mass of a user's sensitive and valuable information. The key factor to ensure effective and successful deployment of single sign-on is the protection of services, as well as access to internal services, and to meet the demand for high-performance.

Single Sign - on
SSO (single sign-on) is a security solution, but also increase system availability solutions. Single Sign-gestation due to the current computer applications, for so many applications, it is generally have too much identification information (user name), as well as too many authentication information (password).
Single Sign-existence is not based on the level of security reasons, but because the user's behavior, have to make the existence of single sign. If for each application or database, the user identification information are different, different password, the user must have excellent memory to remember so many identification information and password. User Management so many user name and password the only way is to these user names and passwords written on a piece of paper, which although the user name and password on their own head to be much easier, but greatly increased the safety risk.
A solution to this problem is to put all the user name and (or) password are set to the same. While this can be solved need to remember many user names and passwords of the problem, but it reduced the availability of the computer environment. Again and again to enter a user name and password is a very boring task, especially when the need to enter contains a lot of letters, numbers, the high-intensity identifier code, the situation even more so.
Therefore, as its name implies, single sign-computing environment will allow more available. In other words, users need only a certification of their own, regardless of how many times they need to access applications. This can also maintain good security, because the user only the only user name and password. Password management is also very simple, because the password needs to be changed only once, regardless of the number of applications.
There are many ways to achieve single sign-on, based on user identification information provided by the different, the methods are very different, and used to complete this task single sign method also varies. At present, the most widely used is Kerberos, DCE and PKI based on the program. SSO is to ensure that the essence of consistency, regardless of how achieved, the purpose of an application is in another application and dissemination of security between the user's identification information, which does not allow users to worry about every time. When used correctly, the single sign can enhance the availability, it is safe solutions.
SSO is not the lack of challenges. When I try different combinations to provide a platform for businesses and products, it can be faced with the realization of practical single sign this challenge. The use of established facts or industry standards, such as Kerberos and PKI, will help solve the interoperability problem.
When users log on to their single sign-environment, and to leave in order to leave open the terminal and when certified, will have single sign-security risks. At this point, if there is a malicious user or curious colleagues decided to open, and has been certified into a terminal, it is probably a disaster. Their application is not just a mandate, but all applications have been authorized.
There are several ways to address these problems: First of all, users should leave the computer system in the pre-conscious to lock the computer; Secondly, the computer should be set to idle after a period of time can be automatically locked; Finally, the single sign of the service allows non-active overtime to withdraw from the dialogue. The use of the above three methods, provided a defense-in-depth protection to ensure that security risks do not really have a real security incidents.
And authentication of users is equally important is to allow users the ability to withdraw from the certification. In order to ensure that other users can not enter the idle computer has passed certification and re-certified by the conversation, to give users the ability to log off the system is also very important. Users have been sent to monitor the single sign-system environment is simple, effective way to ensure that the deployment of single sign program will not be those who have not authorized visitors, or data thieves use spoilers.
For data thieves, the focus on the single sign-services will be their top priority goals. If the single sign-services stolen or leaked, then the hacker could access on the user's a mass of sensitive and valuable information. To ensure effective and successful deployment of Single Sign-a critical factor in the protection of services, as well as access to internal services and to meet the demand for high-performance.

Single Sign -

SSO (single sign-on) is a security solution, but also increase system availability solutions. Single Sign-gestation due to the current computer applications, for so many applications, it is generally have too much identification information (user name), as well as too many authentication information (password).

Single Sign-existence is not based on the level of security reasons, but because the user's behavior, have to make the existence of single sign. If for each application or database, the user identification information are different, different password, the user must have excellent memory to remember so many identification information and password. User Management so many user name and password the only way is to these user names and passwords written on a piece of paper, which although the user name and password on their own head to be much easier, but greatly increased the safety risk.

A solution to this problem is to put all the user name and (or) password are set to the same. While this can be solved need to remember many user names and passwords of the problem, but it reduced the availability of the computer environment. Again and again to enter a user name and password is a very boring task, especially when the need to enter contains a lot of letters, numbers, the high-intensity identifier code, the situation even more so.

Therefore, as its name implies, single sign-computing environment will allow more available. In other words, users need only a certification of their own, regardless of how many times they need to access applications. This can also maintain good security, because the user only the only user name and password. Password management is also very simple, because the password needs to be changed only once, regardless of the number of applications.

There are many ways to achieve single sign-on, based on user identification information provided by the different, the methods are very different, and used to complete this task single sign method also varies. At present, the most widely used is Kerberos, DCE and PKI based on the program. SSO is to ensure that the essence of consistency, regardless of how achieved, the purpose of an application is in another application and dissemination of security between the user's identification information, which does not allow users to worry about every time. When used correctly, the single sign can enhance the availability, it is safe solutions.

SSO is not the lack of challenges. When I try different combinations to provide a platform for businesses and products, it can be faced with the realization of practical single sign this challenge. The use of established facts or industry standards, such as Kerberos and PKI, will help solve the interoperability problem.

When users log on to their single sign-environment, and to leave in order to leave open the terminal and when certified, will have single sign-security risks. At this point, if there is a malicious user or curious colleagues decided to open, and has been certified into a terminal, it is probably a disaster. Their application is not just a mandate, but all applications have been authorized.

There are several ways to address these problems: First of all, users should leave the computer system in the pre-conscious to lock the computer; Secondly, the computer should be set to idle after a period of time can be automatically locked; Finally, the single sign of the service allows non-active overtime to withdraw from the dialogue. The use of the above three methods, provided a defense-in-depth protection to ensure that security risks do not really have a real security incidents.

And authentication of users is equally important is to allow users the ability to withdraw from the certification. In order to ensure that other users can not enter the idle computer has passed certification and re-certified by the conversation, to give users the ability to log off the system is also very important. Users have been sent to monitor the single sign-system environment is simple, effective way to ensure that the deployment of single sign program will not be those who have not authorized visitors, or data thieves use spoilers.

For data thieves, the focus on the single sign-services will be their top priority goals. If the single sign-services stolen or leaked, then the hacker could access on the user's a mass of sensitive and valuable information. To ensure effective and successful deployment of Single Sign-a critical factor in the protection of services, as well as access to internal services and to meet the demand for high-performance

single sign-on
SSO (single sign-on) is a security solution, but also increase system availability solutions. Single Sign-gestation due to the current computer applications, for so many applications, it is generally have too much identification information (user name), as well as too many authentication information (password).
Single Sign-existence is not based on the level of security reasons, but because the user's behavior, have to make the existence of single sign. If for each application or database, the user identification information are different, different password, the user must have excellent memory to remember so many identification information and password.User Management so many user name and password the only way is to these user names and passwords written on a piece of paper, which although the user name and password on their own head to be much easier, but greatly increased the safety risk.
A solution to this problem is to put all the user name and (or) password are set to the same. While this can be solved need to remember many user names and passwords of the problem, but it reduced the availability of the computer environment.Again and again to enter a user name and password is a very boring task, especially when the need to enter contains a lot of letters, numbers, the high-intensity identifier code, the situation even more so.
Therefore, as its name implies, single sign-computing environment will allow more available. In other words, users need only a certification of their own, regardless of how many times they need to access applications. This can also maintain good security, because the user only the only user name and password.Password management is also very simple, because the password needs to be changed only once, regardless of the number of applications. There are many ways to achieve single sign-on, based on user identification information provided by the different, the methods are very different, and used to complete this task single sign method also varies. At present, the most widely used is Kerberos, DCE and PKI based on the program. SSO is to ensure that the essence of consistency, regardless of how achieved, the purpose of an application is in another application and dissemination of security between the user's identification information, which does not allow users to worry about every time. When used correctly, the single sign can enhance the availability, it is safe solutions.
SSO is not the lack of challenges. When I try different combinations to provide a platform for businesses and products, it can be faced with the realization of practical single sign this challenge. The use of established facts or industry standards, such as Kerberos and PKI, will help solve the interoperability problem.
When users log on to their single sign-environment, and to leave in order to leave open the terminal and when certified, will have single sign-security risks. At this point, if there is a malicious user or curious colleagues decided to open, and has been certified into a terminal, it is probably a disaster.
There are several ways to address these problems: First of all, users should leave the computer system in the pre-conscious to lock the computer; Secondly, the computer should be set to idle after a period of time can be automatically locked; Finally, the single sign of the service allows non-active overtime to withdraw from the dialogue.The use of the above three methods, provided a defense-in-depth protection to ensure that security risks do not really have a real security incidents. And authentication of users is equally important is to allow users the ability to withdraw from the certification. In order to ensure that other users can not enter the idle computer has passed certification and re-certified by the conversation, to give users the ability to log off the system is also very important. Users have been sent to monitor the single sign-system environment is simple, effective way to ensure that the deployment of single sign program will not be those who have not authorized visitors, or data thieves use spoilers.
For data thieves, the focus on the single sign-services will be their top priority goals. If the single sign-services stolen or leaked, then the hacker could access on the user's a mass of sensitive and valuable information.To ensure effective and successful deployment of Single Sign-a critical factor in the protection of services, as well as access to internal services and to meet the demand for high-performance.

Not only is single sign-on a security solving plan, it also a plan that would increase the system's usability. The creation of single sign-on was due to the great number of current application of computers which heavily burden users with too many identity recognition information (user name) and too many verification information (passwords).
The existence of single sign-on is not due to the security technological layers, but is the result of users' conduct which make the existence of single sign-on indispensible. If every application or data bank requires a user to have different recognition information and password every time he or she needs to gain access to the data bank, he or she would need to have an above average memory power to remember those identity recognition information and passwords, the only way for an user to manage such a great number of user names and passwords is to write all of them down on a sheet of paper, although it is far easier to write those user names and passwords down onto paper, however, by doing so would greatly increase the security risk.
One way of solving the problem is to make all user names and (or) passwords identical, although this would solve the problem of having to remember lots of user names and passwords, it has,however,
reduced the usability of computer environment.repeatedly logging in user names and passwords is a boring task, it is especially so when logging passwords containing many letters,numerals and symbols.

Therefore, just as its name suggests, single sign-on would increase the usability of computer environment. In other words, users only required to authenticate themselves once regardless of the number of application they use.In this way, good security also would be maintained, because user has only one user name and password. The management of password is also very simple, because password needs to be changed only once regardless of the number of usage.

There are many ways to achieve single sign-on, the methods vary according to users'different information of distinguishing supplied by the users, moreover, the method of completing the single sign-on loggin on procedure is also different. Currently Kerberos,DCE and PKI are the most widely used plans.The real essence of the single sign-on is the gaurantee of its nature of consistency, regardless of how specifically realized, it never let users down everytime.. Once used properly, single sign-on not only could increase usability, but also is a security solving plan.
It is not that single sign-on lacking in chellenge.When attempt was made to assemble platforms and products from various merchants, it was instantly faced with the chellenge of the realization of the practical usage of single sign-on. The usage confirms the standard of facts and industries, for instant,Kerberos and PKI are conducive to solving the problem of mutual operation.

When users log onto their single sign-on setting, and then leave the already authenticated end open and left their computers unattended,this action would cause security risk to the single sign-on plan. At this very moment, if an ill-intention user or a curious colleague decides to investigate this end bit which is open and authenticated, the outcome could be disastrous. Theey don't merely obtain one single application authorization, but all application authorization.

There are some methods to solve the problems mentioned above:
Firstly,users should consciously lock their computers before leaving their computer systems; next, computers should be set to automatically lock out after they have been idle for a period of time: finally,single sign-on servive is able to let inactive dialogues to be aborted if over the time limit set.Using the three methods mentioned above would provide a high degree of preventive protection, and thus ensure security risk would not really cause the real security incidents.
It is just as important that authenticated users are given the ability to abort authentication, for the purpose of not letting other users to enter an unattended and authenticated computer, and put authenticated dialogues in key position,and to give users the ability to log out from the system is also very important. Monitoring users who have logged out from single sign-on system setting is a simple and effective way to ensure the set up of single sign-on plan would have no access to operation by to unauthorized visitors,thieves and data saboteurs.

As far as data thieves are concerned, top of their targets would be the concentrated single sign-on service.If single sign-on service's information is stolen or exposed, then the hacker would be able to obtain lots of sensitive and valuable informations.
The key factors of ensure protection for the set up and the success of logging onto the single sign-on facility is to protect the service and the visits to the interior of the service,and to meet the demand for high efficiency.

1、电子信息科学与技术:电子信息科学与技术专业培养具备电子信息科学与技术的基本理论和基本知识,受到严格的科学实验训练和科学研究初步训练,能在电子信息科学与技术、计算机科学与技术及相关领域和行政部门从事科学研究、教学、科技开发、产品设计、生产技术管理工作的电子信息科学与技术高级专门人才。

2、信息科学技术专业:信息科学技术专业是一个大学专业,培养具有扎实的数学、物理、电子和计算机的基础知识,系统地掌握光学信息处理技术、现代电子学技术和计算机应用技术的基本技能。

3、能在光通信、光学信息处理、以及相关的电子信息科学、计算机科学等信息技术领域、特别是光机电算一体化产业从事科学研究、产品设计和开发、生产技术或管理的面向二十一世纪的高级专门人才。

4、数字媒体:数字媒体属于工学学科门类,是指以二进制数的形式记录、处理、传播、获取过程的信息载体,这些载体包括数字化的文字、图形、图像、声音、视频影像和动画等感觉媒体,和表示这些感觉媒体的表示媒体(编码)等,通称为逻辑媒体,以及存储、传输、显示逻辑媒体的实物媒体

帮我翻译成英语,计算机方面的。专业一点的说~

Research of IP addresses methods of prevention
With the growing computer network, IP address resources progressive tense, each user is allocated a 固定IP unrealistic, while the IP address is a logical value, the user changes to a very convenient So simple to use as a static IP landing Internet identity certification is very fragile, very ordinary IP addresses of others may be to bring the management of the network security risks, resulting in economic losses to the users, this analysis of the IP addresses of the various ways that should be given the preventive measures, and detailed, analysis of the dynamics of a dynamic IP address and Mac address authentication mechanisms.

The experiment according to document electric charge brought forward by 1 measures method, distribution the main body of a book having been carried out on here being extended and being improving , having given trap all quantity , constant current strain being occupied by the electron in architectural insulating barrier of MIS out the down newborn trap's and all quantity and bars medium material middle similar trap all quantity

计算机专业用英语怎么说?
答:意思是:I major in Computer Science.重点词汇:Computer 英[kəm'pju:tə(r)]释义:n.计算机;电脑;电子计算机 [复数:computers]短语:personal computer个人电脑;个人计算机;人计算机;人电脑 词语使用变化:computer n.(名词)1、computer的基本意思是“计算机”,也可译作“...

计算机的英文怎么读
答:短语 Computer Virus [计] 计算机病毒 ; 电脑病毒 ; 计较机病毒 ; 盘算机病毒 analog computer 模拟计算机 ; 模拟电脑 Computer Browser 计算机浏览器 ; 维护网络更新列表 ; 电脑浏览器 ; 计算机阅读器 computer scientist 计算机科学家 ; 电脑科学家 ; 详细翻译 COMPUTER MUSIC 计算机音乐 ; 电脑音乐...

计算机用英语怎么说
答:计算机英语说法2:calculating machine 计算机的相关短语:计算机网路 puter network ; puter ; Data network ; puter munication 电子计算机 puter ; electronic puter ; Manoj Chutiya ; puting machine 计算机系统结构 puter architecture ; puter Systems Organization ; puter systems architecture ; puting ...

计算机英语怎么写?
答:问题一:电脑的英文怎么写 通常叫puter 工作站的电脑叫workstation 手提电脑叫 laptop 问题二:计算机用英语怎么说?发语音!问题三:电脑用英语怎么写 PC:个人计算机Personal puter ・CPU:中央处理器Central Processing Unit ・CPU Fan:中央处理器的“散热器”(Fan)・MB:主机...

请高手帮忙翻译下计算机的专业英语
答:(5)计算机的I/O设备包括键盘、鼠标、绘图仪(plotter)、打印机、软盘和硬盘 Computer's I/O devices include keyboard, mouse, plotter, printer, floppy disk drive and hard disk.(1) Computers can be divided into two categories: analog computers and digital computers.电脑可分为两类:模拟...

我的专业是计算机应用技术专业,翻译成英文
答:回答:我的专业是计算机应用技术,my major is Computer Application Technology

帮忙翻译成计算机的英文啊,要专业点的
答:帮忙翻译成计算机的英文啊,要专业点的单点登录(single sign-on)既是安全解决方案,也是增加系统可用性的解决方案。单点登录的孕育是因为在目前的计算机应用中,针对如此多的应用,人们普遍拥有太多的身份识别信息(

“计算机应用技术” 这个专业 用英语怎么说?
答:“计算机应用技术”"computer applications" “计算机应用技术” 这个专业"computer applications" This professional 本回答由网友推荐 举报| 答案纠错 | 评论 3 3 来如风雨 采纳率:24% 擅长: 暂未定制 为您推荐: 计算机二级 计算机专业学校排名 计算机科学与技术 计算机用英语怎么说 英语趣配音 计算机应用...

我的专业是计算机科学,用英语怎么说啊
答:My major in Computer Science.

求计算机专业课程的英文翻译~
答:of Database 文献检索Document Indexing Web开发技术web development Technology 软件工程Software Engineering 软件工程课程设计Software Engineering Course Exercise 网络安全 Network Safety 系统集成与综合布线system integration and Comprehensive Wiring 专业英语Specialty English 毕业实习graduation field work ...