完整性限制 的英文怎麼說

中文拼音 [wánzhěngxìngxiànzhì]
完整性限制 英文
integrity constraint
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 完整性 : integrity; integrality; wholeness; completeness; perfection
  • 限制 : place [impose] restrictions on [to]; astrict; restrict; limit; confine; shut down on [upon]: 限制...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權、口令管理、審計和監控、備份以及個人隱私等方面;一般的安全防護措施:存取控、標識和認證、、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全策略配置目標包括控對數據的原始訪問、保護內核和系統軟體的、防止有特權的進程執行危險的代碼,以及由有特權的進程缺陷所導致的傷害。
  3. It may be necessary for us to accept these limitations in order that the integrity of operation "overlord" shall not be marred.

    為了使「霸王」作戰計劃的不致受到損害,我們也許必須接受這些
  4. Now, studies on immunogenicity of hp vaccine mainly focus on oral administration with liquid or microparticles. whereas the vaccine solution administrated orally would be digested and decomposed by the low ph and pepsin. though microparticle is a popular form, it has a series of significant problems such as low encapsulation rate and possibility of antigen denaturation as a consequence of expose to organic solvents and high temperature

    目前,國內外對幽門螺桿菌疫苗的研究僅局在口服免疫,劑型以溶液或微球為主,眾所周知,液體疫苗口服后易受到胃內低ph及胃蛋白酶的破壞;微球雖然是疫苗載體研究的熱點,但在備過程中應用的有機溶劑及高溫操作會破壞疫苗的,降低免疫效果
  5. Limits the checking to the integrity of the physical structure of the page, record headers and the physical structure of b - trees

    為檢查頁、記錄標頭的物理結構以及b樹物理結構的
  6. Limits the checking to the integrity of the physical structure of the page and record headers, the physical structure of b - trees, and the allocation consistency of the database

    將檢查為頁和記錄標頭的物理結構、 b樹的物理結構以及數據庫的分配一致
  7. Sql server mobile also provides multiple - connection access to a database, multiple - column indexes and matching index limits, transaction support, referential integrity, 128 - bit file - level encryption and password protection, and a query optimizer

    Sql server mobile還提供對數據庫的多連接訪問、多列索引和匹配的索引、事務支持、引用、 128位文件級加密以及密碼保護和查詢優化器。
  8. For insuring the robustness and high - efficiency of ett utility program, pipeline technology with logical condition of power builder and time - marker table created in data warehouse are adopted while designing and developing ett utility program

    為了確保ett實用程序的健壯和高效以及數據倉庫中數據的一致,在ett實用程序的設計開發過程中採用了powerbuilder具有邏輯條件的數據管道技術,並在數據倉庫中設置了時間標記表和數字標記表。
  9. It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication

    通過ah和esp協議來以下的安全服務:訪問控,無連接,數據源認證,重放攻擊保護,機密和有的通信流保密
  10. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控、無連接的、數據源鑒別、反重放攻擊、機密和有的通信量的機密
  11. Although the software specification described using natural language is easy to write and understand, its validity, integrality, non - ambiguity, consistency are hard to guarantee. the process of verification can only be done by manpower which is not normative and not rigorous. and the complexity of a lot of software has made it impossible to check the specifications artificially

    需求規格說明是需求分析階段的產品,我們通常採用的是未使用任何非形式化的自然語言進行描述,這種自然語言書寫的需求說明,雖然易於理解和使用,但難以保證其正確、無二義、一致,驗證過程只能採用不太規范、不太嚴格的人工走查的方法進行檢查,稍微復雜一些軟體的需求規格說明的檢查,實際上已經超出了人工檢查的能力。
  12. You can enforce domain integrity to restrict the type by using data types, restrict the format by using check constraints and rules, or restrict the range of possible values by using foreign key constraints, check constraints, default definitions, not null definitions, and rules

    您可以強完整性限制類型(通過使用數據類型) 、格式(通過使用check約束和規則)或可能值的范圍(通過使用foreign key約束、 check約束、 default定義、 not null定義和規則) 。
  13. In hardware design, the intactness of the camera ’ s original structure has been maintained to the very extent, the facility of assembling and disassembling devices have been achieved. the remote control has been realized by the separation of active devices from passive devices. in software design, vc + +, keil c51 and matlab are employed, bringing an easy way to communicate with the system

    在硬體設計方面,最大度地保證了相機原始結構的,並且保證了器件易安裝易拆卸,有源無源器件的分離更實現了遠距離控;軟體設計方面,選用了vc + + 、 keilc51和matlab ,通過精心的設計合理地實現了人機對話。
  14. Is a constraint that enforces domain integrity by limiting the possible values that can be entered into a column or columns

    一個約束,該約束通過可輸入一列或多列中的可能值來強實現域
  15. Our third strategy one table per concrete class has some mapping limitations, and the underlying data model can t use referential integrity, meaning that you re not using the relational database engine to its full potential

    第三個策略(每個具體類一個表)有一些映射,而底層數據模型不能使用參照,這意味著您不能發揮關系數據庫引擎的所有潛力。
  16. The system designed the security, the data integrality, the feasibility of verifying, the simplicity of operation. i applied the concept of advanced role controls, regulated easily

    系統在安全、數武漢理工大學碩士學位論文據、校驗可行、操作簡便等方面進行了詳細的設計,在權上採用了先進的角色控概念,更易於管理。
  17. In the creation of a database, a data model and integrity constraints can create certainty in the structure and content of the data

    在數據庫創建中,數據模型和完整性限制能創建數據結構和內容的確定
  18. These standard tools are similar in functionality, but they limit the file system integrity control to files with suid and sgid flags

    這些標準工具功能相近,但是,它們把對文件系統的控於有suid和sgid標志的文件。
  19. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密和抗重放保護,以及對網路通信中的通信流分析攻擊提供有的保護, ipsec協議還提供對網路的訪問控能力。
  20. Implement other xml schema supported data integrity restrictions, such as enumeration lists

    實現其他數據完整性限制支持的xml schema ,例如枚舉列表。
分享友人