完整性模型 的英文怎麼說

中文拼音 [wánzhěngxìngxíng]
完整性模型 英文
clark-wilson integrity model
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • 完整性 : integrity; integrality; wholeness; completeness; perfection
  • 模型 : 1 (仿製實物) model; pattern 2 (制砂型的工具) mould; pattern3 (模子) model set; mould patter...
  1. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    採用嵌入式pki成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密
  2. The cube models being queried should be valid according to the base rules and cube model completeness rules defined for the db2 cube views metadata

    按照基本規則和db2 cube views元數據定義的多維數據集規則,查詢的多維數據集應該是有效的。
  3. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru的細粒度自主訪問控制、基於bell - lapadula多級安全規則的強制訪問控制以及基於biba的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密
  4. The main contents of testing the strength of subgrade abamurus using earthquake wave velocity are as follows : the influence of the lithology and strength of flag stones and the shape of block upon wave velocity, the influence of the strength of cement mortar upon earthquake wave velocity, the estimation standards of the strength and completion of abamurus. this paper puts forward an accurate no - destructive testing using the different reflect of elastic wave velocity for abamurus stones, the strength of mortar, the plumpness of mortar and the type of abamurus, on the basis of laboratory tests and field tests. it can be used to accurately distinguish the completion of abamurus

    地震波速法檢測路基擋墻強度,研究的主要內容有:片石巖和強度及塊體形體對波速的影響;水泥砂漿強度對墻體波速的影響;擋墻體強度和的評估標準。應用彈波速度對擋土墻石材、砂漿強度、砂漿飽滿度及擋墻類的不同反映,在室內外試驗和現場生產試驗的基礎上,提出了一種正確的無損檢測法,可以正確判別漿砂片石擋墻墻身的
  5. Due to the incompleteness of model library and uncertainty of modeling knowledge, qualitative compositional modeling is a process of " generate and test " during which the composed model must be modified and improved. there are two separate sub - tasks about cm, model composition and model simulation, which communicate with each other through qualitative differential equations ( qde )

    的特點,決定了定組合建是一個需要重復調善的迭代過程,建擬是通過定微分方程相關聯的兩個子任務,建擬的基礎,擬是對建結果的檢驗。
  6. The planeness and integrality of the flier - plate were ensured effectively by exerting restrictive pressure, controlling heating and cooling rate, lowering welding temperature or reducing welding time as much as possible, etc. theoretical model of creating quasi - isentropic compression via 93w - ofc - tc4 - a1 - mb2 system flier - plate with graded wave impedance was established, and numerical simulation of the impact process was then carried out

    採取施加外部機械力、控制升降溫速率以及盡量降低焊接溫度或減少焊接時間(防止脆金屬間化合物的過度增長)等措施,確保了焊接接頭的平和界面結構的。建立起梯度飛片擊靶的理論,對93w - ofc - tc _ 4 - al - mb _ 2系波阻抗梯度飛片的擊靶過程進行了數值擬計算。
  7. Pki is a transparent and seamless platform for the network system provided the service of confidentiality, integrity, authentication and non - repudiation, while ca is a necessary and important component in pki, pki ' s modules, functions and its applications are firstly described in this dissertation, with specially emphases on the issuing certificates, issuance mechanisms of revoked certificates, message format and hierarchy of cas as well as the performance of the system

    Pki可以為網路上的各種應用提供機密、身份鑒別和不可抵賴的安全保障,簽證機關是pki系統中的重要組件。本文闡述了pki系統的、功能和應用,重點討論了簽證機關的證書發布、層次結構、消息格式、撤銷證書的發布機制等問題,以及它們對系統能的影響。
  8. The fault samples with the signal of zero or one and the model of bp neural network are established, in accordance with nine faults of pulverizing system for chongqing power plant. during the course of the samples compilation, produce rule 、 neural network representation etc are synthesized to organize and express the fault sample of pulverizing system. before being putted into the database, the sample data is disposed to ensure sample data integrity and no redundancy

    本文針對重慶發電廠制粉系統九種故障建立了以0 、 1為徵兆量的故障樣本和相應的bp神經網路,且在制粉系統故障及其相關故障樣本編輯過程中,應用了神經網路產生規則式、框架式等知識表達方法,有效的表達制粉系統故障及其相關故障診斷知識,並且為保證數據的,減少數據冗餘,對數據庫進行了規范化處理,簡化了數據結構和避免了數據沖突。
  9. The 3 - d finite element models of the experimental motors are established. the structural integrity of the experimental motors under internal pressure and lateral overload is analyzed. the influence of lateral overload on the structural integrity of motor is discussed

    建立了試驗發動機的三維有限元,分析了內壓和橫向過載聯合作用下發動機結構,討論了橫向過載大小對發動機結構的影響。
  10. And it would be applied to other blast furnaces after some modifications. to improve the quality of the model, some methods should be used in future : l. impoving the database and making it have more information. 2. considering the mass and thermal accumulation and calculating the effect of the data of every period

    2 、在作動態計算時,使用日平均數據來調參數,而用即時的數據來計算預測值,這種方法盡管有一定的科學,但要提高的準確,必須考慮到高爐內物料和熱量的積累,考慮各個時段入爐物料對化學平衡和熱平衡的影響,根據專家系統和神經元網路的方法,得到更為善的
  11. Through identifying better and apperceiving earlier organizational politics behaviors, in order to reduce all sorts of kickbacks to nadir, in our research according to ferris organizational politics perception model, combining the practice of key disciplines of the university, based on integrated, scientific, objective, precise, measurable principle, we construct cause and effect model of knowledge - intensive organizational politics perception

    為了更好的識別和盡早感知組織政治行為,將其給組織帶來的種種不良後果減少至最低,本研究參照ferris組織政治知覺,並結合我國大學重點學科的實際,依據、科學、客觀、精確、可測原則,構建了知識密集組織組織政治知覺前因及後果
  12. Symbol logic method is unable to guarantee the complement of knowledge description, which leads to complicated deducing process. we introduce fuzzy cognitive map into agent modeling and deducing, substitute symbolic description and inference with simple mathematical computing, achieving agent intelligent decision - making in complex environment

    針對現有符號邏輯描述方法難以保證知識表達的,推理過程陷於復雜的邏輯演繹的問題,作者引入了糊因果關系的網路,基於糊認知圖理論構造agent推理,用簡單的數值計算代替復雜符號系統的表示和演繹推理過程,實現了復雜環境下的agent智能決策。
  13. These osds have to be checked on completeness, consistency and level of detail before the model can be handed over to the incremental design and build stage

    該等物件順序圖的、一貫和詳細程度必須先予以查核,然後該才可進入遞增設計和建設階段。
  14. System functions of gsmb based on " godson " cpu was programmed by the discussion of " godson " cpu micro - system structure finalization and by the introduction of " godson " cpu performance requirements. this essay also specified on gsmb board level system structure, bios level solving and selection of important chips. moreover, problems related to high speed circuit design such as mensurability, pcb layout signal integrity, electromagnetic coexist were researched

    通過對「龍芯1號」 ( godson ) cpu微體系結構定的討論和關于「龍芯1號」 cpu所需達到的的能指標的介紹,規劃了基於「龍芯1號」 cpu的高速服務器主板gsmb的系統功能,並敘述了根據系統功能所設計的gsmb板級系統結構、 bios級解決方案和重要晶元的選;另外還研究了高速電路設計所涉及的如可測試、信號、電磁兼容等一系列問題,並依據研究構建了基於ibis的軟體,同時藉助eda擬分析工具對關鍵線網與關鍵塊進行了板級擬。
  15. Base on the object - oriented theory of software engineering, one object - oriented model of led lamp is presented. lamp database is used for the fundament of led simulating system in the designing of led lighting system. and the author has developed one kind of led lamp database

    燈具庫作為led燈光擬系統的基礎,在照明設計中它可以為led擬系統提供有關產品的數據,並保證led燈具的數據的,作者研究並提出了led燈光擬系統中led燈具庫的建立方式。
  16. Model of data remote transmittal based on ca authentication is compound by ca authentication and sensitive data security. on one hand, ca authentication is developed on the basis of openssl function libraries, which provide secure and reliable channel for sensitive data between two communication terminals ; on the other hand, sensitive data in server database is encoded by fields, which keep invisibility for non - correlation persons

    基於ca認證的數據遠程存取是我們利用基於openssl函數庫開發的ca認證過程來為通信兩端提供安全可靠的通信通道,具有信息保密、信息、身份認證等功能,同時,對企業重要數據欄位進行加密,來保證數據庫端的數據安全。
  17. Topics include : relational databases, sql ( structured query language ) ; types, relations, relational algebra, integrity, view ; functional dependency theory, normalization, semantic modeling, entity - relationship modeling, conceptual database design ; concurrency control, security ; database and web connectivity, xml

    主題包括:關聯式資料庫、 sql (結構查詢語言) ;資料類、關聯、關聯式代數、、景觀表;功能依附理論、正規化、語義塑、實體關聯塑、概念資料庫設計;同時操作控制、安全;資料庫與網頁連結、 xml (可擴展標示語言) 。
  18. Our third strategy one table per concrete class has some mapping limitations, and the underlying data model can t use referential integrity, meaning that you re not using the relational database engine to its full potential

    第三個策略(每個具體類一個表)有一些映射限制,而底層數據不能使用參照,這意味著您不能發揮關系數據庫引擎的所有潛力。
  19. In this dissertation, on the basis of the analysis of the dimension effect of engineering drawings, a dimension model based on functional semantics is advanced. a new scheme for constructing and adjusting the initial dimension model is put forward, meeting the dimensioning requirement of integrality and rationality

    本文在分析工程圖紙尺寸作用的基礎上,建立了基於功能語義的尺寸,介紹了尺寸的初始生成方法,提出了尺寸的調策略,從而滿足尺寸的和合理要求。
  20. Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization

    第三,在深入研究多級安全完整性模型、基於角色的授權等基礎上,首先提出了一個修改blp( mblp )的方案,並在一個自主開發的安全操作系統中得到了應用;然後通過將blp、 clark - wilson、 dte、 rbac有機地集成應用,提升出一個支持機密和授權等多安全策略的,可實現動態授權的訪問控制( daacm ) 。
分享友人