數據保密原理 的英文怎麼說

中文拼音 [shǔbǎoyuán]
數據保密原理 英文
principle of data security
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ形容詞1 (最初的; 原來的) primary; original; former 2 (沒有加工的) unprocessed; raw Ⅱ動詞(原...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 數據 : data; record; information
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、電訊的機性和完整性、電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加技術以及各國立法對碼技術的進出口及使用的控制,第六章介紹了字簽名的概念及,並以bolero為例介紹了字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了電訊制度產生的必然性;第八章通過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴性。
  2. The controlling parameters for smooth blasting in qin - ling zhongnanshan tunnel project are optimized according to the fundamental principle of smooth blasting, considering the minimal resistance, coefficient of embrasure density, coefficient of non - coupling, density of dynamite and rate of exploding. the efficiency of this method has been analyzed and justified by the high speed and good quality of the project

    光面爆破的基本,從最小抵抗線、爆眼集系、不耦合系、線裝藥度、爆破進尺等幾個方面確定秦嶺終南山隧道光面爆破主要參的選取,分析了該隧道鉆爆設計在隧道施工中的運用取得的成效,提高了施工進度,同時也證了施工質量。
  3. The paper analyzes the secure problem existing in the tcp / ip protocol, discusses the possibility and superiority of secure transmission in network layer, researches the architecture of protocol ipsec, presents the design thought of using ipsec to realize the secure transmission within the pbc ' s intranet under the windows. the paper gives a schema of secure transmission system in the pbc ' s intranet, realizes it using the windows kernel program technology and obeying the specifications of ndis and ipsec. the secure transmission system promotes the secure extent of the pbc ' s intranet

    論文針對人民銀行內聯網面臨的信息和安全傳輸問題,分析了tcp / ip協議存在的安全問題,探討了在tcp / ip網路層實現安全傳輸的可能性和優越性,認真研究了ipsec協議體系結構和esp協議、 ah協議、 ike鑰交換協議的,在既要護已有投資,又要提高安全程度的前提下,提出了在windows操作系統下採用ipsec實現人民銀行內聯網安全傳輸的設計思想。
  4. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗始性、真實性的唯一依;電子文件歸檔管層中的主要任務是要建立起嚴的歸檔制度,同時結合「文件生命同期表」建立檢驗措施證電子文件在歸檔過程中信息內容的始性、真實性;電子檔案管層中主要任務是建立電子檔案始性、真實性檢驗及恢復管措施,通過對電子檔案載體的維護、建立電子檔案維護管的信息文檔等工作,確管期限中的電子檔案持其可用性、可存取性、可解性:建立電子文件與電子檔案始性、真實性護體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確護體系」安全運行;加強「護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對護電子文件、電子檔案信息始性、真實性有著重要意義。
  5. The capsim model, originally developed by the center for chinese agricultural policy research of the chinese academy of sciences, is the first and most comprehensive model for chinese food demand, supply and trade analysis at the national level. the podium model, developed by the international water management institute, is a tool for accounting of water resources at the basin level. capsdvi - podium has been used as a tool in this paper for analyzing food security and water balance scenarios of china in 2020 based upon the database about food and water situation at the national level, provincial level, basin level and county level, hi accordance with such analysis, this paper puts forward policy recommendations for irrigation diversion of water, regional distribution of agriculture and food security

    因此,論文將糧食需求和生產、灌溉需水和水資源障緊的聯系起來,在不打破水資源流域特性的基礎上,以全國和九大流域片為研究對象,通過利用全國、流域、省級、縣級統計資料和農產調查及專家訪談資料所建立的包含農業生產、糧食供求、灌溉用水和水資源等指標體系在內的中國糧食安全與水資源庫,以來中國科學院農業政策研究中心( ccap )開發的以部門均衡論為基礎的農業政策分析和預測模型( capsim )和國際水資源管研究所( iwmi )開發的以流域水資源核算論為基礎的水資源政策分析模型( podium )為依託,發展了capsim ? podium模型,利用該模型為工具,系統、全面地分析了未來全國和九大流域片的灌溉水平衡和糧食安全情景,在此基礎上提出我國灌溉用水、區域農業布局和糧食安全政策。
  6. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動通信專網的知識及關鍵技術,詳細介紹了安全管中心的功能- -鑰自動產生和分配、被動式和主動式鑰遙控銷毀、專用空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果進行分析;重點對安全通信網關進行了深入研究,確定了一種系統模型並進行了總體設計,然後對其中專用信息傳輸的設計實現進行重點介紹;本文還對安全管中心的短消息安全通信網關與專用手機進行性能測試,測試結果表明該系統符合課題的各項技術指標,實現了安全通信網關的各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展的內容提出了具體建議。
  7. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    散列字簽名演算法利用rsa公鑰碼體制的、 md5單向散列函和排列碼加的思想,構造了一種能夠快速實現字簽名的簽名方案。
  8. In this thesis, the database of gps vehicle monitor information management system is designed, the design of the man - machine conversation interface and the software of the database server, also the software of the mid - ware are accomplished. an improved and logical three layer structure framework is used to utilize the resource of the system efficiently, balance the load, and improve the expansibility of the system ; powerful oracle database is used as background database to provide high performance service to the system which has numerous users and large - scale ; encrpytion arithmetic of communication data is designed to ensure the safty of gps vehicle monitor information management system communication ; the usage of fire wall, system privilege management and data backup improved the safty of the information management system database ; high usability design is realized by oracle data guard ; optimization of the information management system made the whole gps vehicle monitor system persistent, stable and high quality

    本文針對有gps車輛監控系統響應速度慢、穩定性和安全性不高的不足,提出了一種以改進的三層結構體系為系統架構,以oracle庫為后臺的gps車輛監控信息管系統設計方案,設計了gps車輛監控信息管系統庫,完成了gps車輛監控信息管系統人機界面、中間件及庫端的軟體設計。系統架構採用改進的三層結構體系,其邏輯結構清晰,有利於系統資源的有效利用,均衡負載,提高系統的可擴展性;后臺庫採用功能強大的oracle庫,可以提供大規模、多用戶的高性能服務;通信的加演算法有利於確gps車輛監控信息管系統的通信安全;防火墻的使用、系統權限管以及的備份和恢復等有利於提高gps車輛監控信息管系統庫的安全性, oracledataguard的使用有利於提高系統的可用性;系統的優化,為系統持續、穩定、高質量運行創造了有利條件。
  9. Except in the event of breach of confidentiality, in no event shall either party be liable for any damages, including loss of data, lost profits, cost of cover or other special, incidental, consequential, direct or indirect damages arising from the use of the products, or provision of, or failure to provide, support, however caused and whether based on agreement, tort ( including negligence ) or any other theory of liability

    除非違反了規定,任何一方在任何情況下,對因使用產品、或提供或未提供支持,無論何種因,亦無論基於協議、侵權(包括過失)或其他責任論而引起的損害,包括丟失、利潤損失、服務費用或其他特殊的、附帶的、後果性的、直接的或間接的損害均不負賠償責任。
  10. Firstly, the imaging principle of swept - volume technique is analysed. voxel attributes, voxel density and the way to keep the invariableness of voxel density are studied, and the method of parallel data transmission link is discussed

    首先,分析體掃描技術的成像,研究體素的特性,度變化,如何持體素度的恆定,提出了并行傳輸連接的方法。
  11. The thesis introduces the principle and development of applied ciyptography, encr, ption and digital signature. it also introduces the thought and technology of the object - oriented methodology. with the development of the object - oriented technology and distribution application, object - oriented communication has become popular

    本文論述了應用碼學以及字簽名( digitalsignature )的及發展;同時介紹了面向對象方法學的思想和技術,指出隨著面向對象技術和分散式應用技術的發展,面向對象的通訊機制正變得越來越流行,安全對象的提出為此種通訊機制提供了必要的安全證。
  12. All our employees who have access to, and are associated with the processing of personal data, are obliged to respect the confidentiality of official business matters, including personal data

    責成能存取個人以及與處個人有關的所有雇員遵守官方公務的則,包括對個人
分享友人