控制網加密 的英文怎麼說

中文拼音 [kòngzhìwǎngjiā]
控制網加密 英文
extension of control
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息技術以及各國立法對碼技術的進出口及使用的,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. In the second part of this paper, it makes a detailed analysis among fluid - model - based, smith - principle - based and two - pd - controllers - based by comparing to the method and application of control theory. then it gets the laws to keep the control loop stable. in order to analyze the dynamic and transient characters, three congestion control algorithms mentioned above have been carried out in the nist atm network simulator and the successful outcomes are brought out

    本論文對atm路abr業務擁塞理論演算法進行了總結,簡要分析了其優點和缺點;運用理論的分析方法和觀點對基於流體模型、史斯預估模型和雙重比例微分模型三種擁塞演算法以具體的分析,從而分析了怎樣確保環的穩定性;在nistatm路模擬軟體中嵌入以上三種擁塞演算法,從而對演算法的動態和瞬態特性進行模擬分析,以此證明演算法的有效性;最後提出了今後atm路abr業務擁塞演算法的發展趨勢。
  3. To build the information system in order to strenthen the work of information collecting, to improve the cooperation between law enforcements in order to establish the stategy of prohibiting drug, and to strike the drug crime thoroughly by cooperation among united nations committee on drug crime, international criminal police organization and the law enforcement of other countries

    4 、大力強隱蔽斗爭,建立秘力量,採用內線偵查、外線監相結合的方法和下交付的偵查策略,組織專案偵查。 5 、積極強情報工作,廣辟情報來源,建立系統的情報收集、處理路,為緝毒偵查服務。
  4. The tradition safety technique such as authenticate, accredit, encrypt, fire - wall and the control of accessing can not protect the information of network well. the safety of network faces great challenge and imperil

    傳統的安全保護技術如認證、授權、訪問、防火墻和等外圍防衛機已力不從心,計算機路信息安全正面臨著極大的威脅和挑戰。
  5. Practice and application of gps in short base - line net

    在短基線控制網加密中的實踐與應用
  6. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公路的安全策略由下至上劃分為路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理、邏輯、 vpn與數據、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  7. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著路技術的迅速發展,路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵路,路安全問題成為人們關注的焦點,傳統安全方法是採用盡可能多的禁止策略來進行防禦。目前採用的手段有防火墻、、身份認證、訪問、安全操作系統等,這些對系統非法入侵都起到一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  8. The article elaborates on medical treatment insurance integrated services network mis at last, especially details the issues in actualizing it : the strategy of network security, the technique of popedom management, the technique of multilayer - distributing bases on groupware, encrpytion checkout, the mode of popedom management bases on roles, audit and control of operation - log, and theory of closed loop safety control

    文章最後結合醫保綜合業務路管理信息系統實例以詳細說明,尤其在實施過程中採用了路安全策略,權限管理技術,基於組件的多層分散式技術,校驗,基於角色的權限管理方式,操作日誌審計監,閉環安全理論等問題進行了詳細的探討。
  9. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對電子政務系統路的安全進行了分析,其中包括路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問、通信、數據保護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市電子政務信息路的風險分析及安全需求分析,對其路安全的整體解決方案進行了詳細設計。
  10. Control displays a web page containing multiple frames with content of different encryption levels, the value of this property is

    項顯示的頁包含多個框,而這些框的內容具有不同的級別,則該屬性的值為
  11. Security on secret information network system is different from the general information network. after doing the abundant investigation to x institute information network system, a solution on its system physics safe, network operation security, information safe and secret and safe and secret management, etc. has been designed according to the safety engineering. the designed scheme for the x institute has passed the evaluation of " the national weaponry secret qualification of production unit of scientific research examine authentication "

    根據涉信息路對安全的特殊性,根據國家對涉信息路安全的相關規范,筆者對x所的信息路系統進行了充分的調查,以及系統脆弱性和風險分析后,按照信息系統安全工程的方法設計了針對該所整個信息路系統物理安全、路運行安全、信息安全保以及安全保管理等方面的解決方案,完成了路安全域劃分、防電磁泄漏、安全審計、路安全管理、信息傳輸和訪問等工作。
  12. Functions are analyzed from the four components of network cipher computer, key distribution management center ( kdmc ), web management computer and secure remote access system ( sras ). suggestions are proposed for confidentiality, authentication and visit control. ipsec protocol architecture, important concepts and characteristics are studied in detail

    分析了鑰管理中心、機、 web管理機和安全遠程接入四大部分的功能,給出了vpn碼機系統的機性保證、認證和訪問方法,詳細論述了ipsec基本協議、重要概念和特點。
  13. In order to participate in the contest, however, you will need to return to the contest web site several times to enter and confirm information about your team, and to print out your team ' s control and summary sheets that you will use when preparing your team ' s solution packet

    為了參比賽,您還要返回組委會的站,登陸並確認所有與您的隊伍相關的資料,列印出您的隊伍的和簡歷頁面,這些將在您們準備參賽隊的包裹封的時候用到。
  14. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體和編流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「運分離」體改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹、 adsl為接入端的基於公用數據路分組交換技術的系統路體系結構,並針對路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯、防火墻、數據等技術手段提高系統的路安全性能。
  15. Consequently, while this specification is an important component of secure xml applications, it is, by itself, not sufficient to address all application security trust concerns, particularly with respect to using signed xml or other data formats as a basis of human - to - human communication and agreement

    這里只不過是通過擾數據來訪問。大多數情況下,必須通過不安全媒體(如計算機路)來傳送敏感數據,同時還要保持機。只允許授權的人理解數據。
  16. Therefore, this thesis studies on the architecture, key technologies and methods for the implementation of the database access agent. furthermore, the emphasis of this thesis is focused on the database flux control, database encryption techniques, and encrypted network transmission

    論文主要研究了數據庫訪問代理的系統結構、關鍵技術及實現方法,其中重點研究了數據庫訪問代理設計與實現中數據庫服務器流量、數據庫設計和路傳輸等內容。
  17. In the chapter of component based database access agent, the component criterion for the agent is selected and the component frame of the agent is designed based on the discussion for the component development technology. in the chapter of the platform of network communication, its operational principle is discussed at first, then the program structure of the platform and the key technology of encrypted network transmission is focused. in the chapter of the design and implementation of the server of the agent, the operational principle is researched, the program structure is designed, and the key technologies of database flux control, data buffer, and database security are studied

    基於組件的數據庫訪問代理設計介紹了組件開發技術、數據庫訪問代理的組件標準選擇及數據庫訪問代理的組件框架設計;路通信平臺設計和實現研究了路通信平臺的工作原理、實現過程中使用的基本技術,論述了傳輸關鍵技術,設計了路通信平臺的程序結構;代理服務端設計和實現研究了代理服務端的工作原理,論述了數據庫流量和訪問優先級調度、數據緩沖及安全數據庫支持等關鍵技術,設計了代理服務端的程序結構;代理客戶端設計和實現研究了代理客戶端的工作原理,設計了代理客戶端的程序結構和組件介面。
  18. Image : foto11s. jpg typical in - vehicle transponder vehicle position device 7. 14 by the use of increasingly powerful in - vehicle computers linked to external information sources and traffic control centres by means of modern communications, a range of solutions to improve road safety, to improve traffic management of the transport network and to provide travel information are available to make more intelligent transport decisions

    14汽車內置電腦已越來越精,這些電腦應用現代通訊科技,與外間的資訊系統和交通中心聯系,其應用范圍十分廣泛,包括改善汽車安全、強運輸路的交通管理,以及提供交通資訊,讓道路使用者作出更明智的運輸決定。
  19. We have a further study to the base of dynamic cost control the dynamic control process, strengthen the research and use of the network planning technique, connect the time data with the cost under the working day ? ost linear relation based on the cmp and gert

    本文將現代動態理論引入裝飾施工項目成本,對成本動態的實現基礎、動態過程進行了深入探討,路計劃技術的研究與應用,把時間參數與成本緊聯系在一起。
  20. In addition, a method of mesh gradation control by means of point distribution and a method of mesh refinement were also proposed in this paper

    另外,論文還討論了通過布點來格漸變的方法以及方法。
分享友人