完整性控制 的英文怎麼說

中文拼音 [wánzhěngxìngkòngzhì]
完整性控制 英文
integrity control
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 完整性 : integrity; integrality; wholeness; completeness; perfection
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠、交易者身份的真實、數據電訊的機密、數據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了數據電訊度產生的必然;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴
  2. Check control box it is connected completeness and exactness

    2檢查電器箱電源接線的和正確
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般的安全防護措施:存取、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問,保證了策略傳輸的機密
  5. The gis developed with the combination of mapx controls and object language, realizes the integral saving and management of spatial data and attribute data, and theoretically ensures the datashare and the integrality of data. such a system has been applied to the daily management of chongqing expressway, is proved to be of active contribution to the work efficiency and effect. it will surely promote the development of its in the future

    基於oraclespatial ,運用mapx項和面向對象語言相結合開發的gis應用系統,實現對gis空間數據和屬數據的一體化存儲和查詢,即不將地理信息存儲在原來的地理信息系統中,而是存到關系數據庫中,這種一體化技術實現了數據管理的規范化和數據操縱的標準化,使用戶可以比較方便的組織各類空間信息處理事務,在數據方面提供了有效保證。
  6. Company was set up in 1997, as a high - tech enterprise with ability of reserch, development and manufacture, it was set up for limited company in 2006, and has passed iso9001 : 2000 quality adminis - tration system certification. company have professional works, excellent process equipments, perfect checkout apparatus, and produces all sorts of premanent magnetic chuch, electro magnetic chuch, rectiffication ` s manipulator and magnetic removal with adwantages of advanced designment, long longevity, big suction and small remanence. the quality has passed the certification of china quality test association and china quality indemnify center

    公司成立於1997年,是一家集科研開發生產為一體的高科企業, 2006年組建為有限公司,並通過iso9001 : 2000質量體系認證,公司擁有專業的技術人員,精良的加工設備,善的檢測儀器,所生產的各種永磁吸盤、電磁吸盤、器、退磁器等磁工具,具有設計先進、壽命長、吸力大、剩磁小等特點,質量通過中國質量檢驗協會,中國質量保障中心認證。
  7. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問、基於bell - lapadula模型多級安全規則的強訪問以及基於biba模型的強訪問等多種安全策略,從而有效地增強了操作系統中信息的保密
  8. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全策略配置目標包括對數據的原始訪問、保護內核和系統軟體的、防止有特權的進程執行危險的代碼,以及限由有特權的進程缺陷所導致的傷害。
  9. To achieve conceptual integrity, deemphasize control mechanisms in favor of

    要獲得概念上的,請降低的重要,這有利於:
  10. So, in this thesis research, the information fusion is not only a data disposal process from lowers to higher, but also the feedback from higher to lower, that means the higher takes part in the d ata fusion of lower. simulations and trials validate all these methods and the results of these show that it is very effective to improve the control performance of auv by applying data fusion technology to the motion control system

    本文通過水下機器人的模擬試驗和海上智能作業試驗進行驗證,試驗結果表明,將多傳感器信息融合技術應用到水下機器人的運動系統中,提高了系統的可靠和保障水下機器人的安全航行和成任務,促進水下機器人智能技術的發展。
  11. The planeness and integrality of the flier - plate were ensured effectively by exerting restrictive pressure, controlling heating and cooling rate, lowering welding temperature or reducing welding time as much as possible, etc. theoretical model of creating quasi - isentropic compression via 93w - ofc - tc4 - a1 - mb2 system flier - plate with graded wave impedance was established, and numerical simulation of the impact process was then carried out

    採取施加外部機械力、升降溫速率以及盡量降低焊接溫度或減少焊接時間(防止脆金屬間化合物的過度增長)等措施,確保了焊接接頭的平和界面結構的。建立起梯度飛片擊靶的理論模型,對93w - ofc - tc _ 4 - al - mb _ 2系波阻抗梯度飛片的擊靶過程進行了數值模擬計算。
  12. Wirings of the poly layer are always utilized under the silicon grid technics. to control the macro - cell signal delay and improve signal integrality, the crossing among different nets must be averagely distributed to reduce the number of layer permutation. the metal layer wirings should be maximized and the length of poly layer wiring in each net should be minimized

    硅柵工藝晶體管級布線利用多晶層走線,為了宏單元時延能及改善信號形態,關鍵是不同線網間交叉的均衡分配以減少走線的換層次數,最大化金屬層走線以及每一線網多晶層走線長度的有效
  13. For the financial performance evaluation, the author study it from the following fields : the finance cost, the finance risk, the finance structure and the finance paid - off ability. for the investment performance evaluation, the author study it from the investment effective and efficiency, the safety and the wholly of assets which the group company invested

    籌資評價從籌資成本、籌資風險、籌資資本結構、償債能力等方面進行評價;投資評價主要從投資效率、效益,投出資產的安全等方面進行評價
  14. To maintain the integrity of the process logic, manual air supply overrides for control and automated valve actuator solenoids are not permitted

    為保持工藝器與自動閥門執行機構的電磁閥不許手動供氣取代自動
  15. A set of access control system is proposed to achieve the requirements of both electrons government affairs and securities and integrity ; these performances are realized in c + + and the system has put into use

    提出並實現一套訪問系統使其既能滿足現實電子政務的應用要求,又能滿足信息的機密要求;用c + +語言實現以上的全部功能,此系統已在中船重工集團獲得使用。
  16. This subsystem adopts the oracle database, which can integrally manages data. the oracle database has features as follows : store a mass of data, define and operate the data, security control, integrity control, system resume, and so on

    這一部分首先選用了具有的數據管理功能的oracle數據庫,這些功能包括存儲大量數據、定義和操縱數據、並發、安全完整性控制、故障恢復、與高級語言(如c , java等)介面等。
  17. The blp model lays emphasis on the control of the secrecy, and the information transaction from high security level to lower level is controlled. however, the blp model lacks the control of the information integrity, unable to master the operation of " write up " ", and there are potential problems in the " write up " operation

    Blp模型主要注重保密信息從高安全級傳向低安全級,而缺少完整性控制,不能「向上寫( writeup ) 」操作, 「向上寫」操作存在著潛在的問題。
  18. Each part of the heterogeneous database has its own autonomy quality. at the time of realizing the data sharing, each database system have its own application characteristic, the integrality control and the security control still

    異構數據庫的各個組成部分具有自身的自治,實現數據共享的同時,每個數據庫系統仍保有自己的應用特完整性控制和安全
  19. This system ' s architecture is based on the advanced pki techniques and encryptions techniques, configured with indispensable hardware for security technology to form a substantial application security platform. this integrated application security platform provides the muti - platform applications systematical uniform security services, mainly including user ' s identification, confidentiality and integrity for data transmission, access control, user ' s digital sign and verification, cryptographic key management etc, to fulfill the trans - computer - type and trans - operation system control & management system, which is independent of different business applications or business procedures

    本設計方案以信息系統安全理論與系統工程學原理為基礎,在網路環境下構建了應用安全平臺,實現了一個跨硬體機型與操作系統臺的、與具體應用部署方式無關的統一的安全策略配置,實現了包括身份認證、訪問、數據機密完整性控制、應用密鑰管理服務、抗抵賴、安全審計、數據安全等安全服務。
  20. According to some kinds of existed attacking methods that are aimed at the web system, the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol, and the related secure protocol standard. and focusing on cryptography, the paper lucubrates the technology of secure transmission of information such as data encryption, digital signature, identity authentication and data integrality technology

    本文針對web系統中信息傳輸所面臨的安全威脅,從保障網路信息安全傳輸的角度,系統研究了tcp ip各個層次上實現安全通道的可行及相關的安全協議標準,圍繞密碼體,對數據加密、數字簽名、身份認證、數據完整性控制等信息安全傳輸技術進行了深入的探討。
分享友人