數據保密性 的英文怎麼說

中文拼音 [shǔbǎoxìng]
數據保密性 英文
dc data confidentiality
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 數據 : data; record; information
  1. Some features of this chip are listed below : firstly, it opts for ir data transmit technology, so it have the advantages of little emi, simple operation, low cost, etc. secondly, the synchrony method makes it have good noise suppression and ber quality

    該「紅外名片交換專用晶元」能獨立完成名片交換和管理的任務,具有顯著優點: 1採用紅外通信的方式,具有技術方案成熟,交換方法簡單,好,相互電磁干擾小,成本低、簡單易用等優點。
  2. Under most civil tax laws, tax returns and most civil enforcement actions have some degree of confidentiality from public scrutiny

    大多民事稅收法律規范,納稅申報表和大多的民事強制執行案件都有一定程度的,不對公眾公開。
  3. Compared with traditional communication networks, a data communication network has the advantages of digitalized data, broad bandwidth, intelligent systems, networking structures, integrated services, strong anti - interference and high security. it can provide various communication services with uniform platforms, which are what the telecommunication owners have built up or / and are building

    通信網與傳統通信網相比具有字化、寬帶化、智能化、網路化、綜合化、抗干擾能力強、強等特點,而且能夠為各種通信業務提供統一的平臺,這也是各個電信運營商目前在建或建設完成的網路平臺。
  4. 5 ) for fsca introduce the distributed model named corba over ssl, it is well extensible and secret in transmission

    5 )採用corbaoverssl的分散式模型。 fsca具有良好的傳輸和系統可擴展
  5. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始、真實的唯一依;電子文件歸檔管理層中的主要任務是要建立起嚴的歸檔制度,同時結合「文件生命同期表」建立檢驗措施證電子文件在歸檔過程中信息內容的原始、真實;電子檔案管層中主要任務是建立電子檔案原始、真實檢驗及原始恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確管期限中的電子檔案持其可用、可存取、可理解:建立電子文件與電子檔案原始、真實護體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確護體系」安全運行;加強「護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對護電子文件、電子檔案信息原始、真實有著重要意義。
  6. The digital map is usually formed by the water depth ' s database measured on the seabottom. because of the disadvantage that the database is kept secret, this dissertation introduces a new method : first, the depth data are picked up from the electronic chart, then interpolation of the depth datum by kriging algorithm is adopted to gain the digital map. the method is the precondition of the terrain matching when it is researched by simulation, and it is the complement of the database

    通常字地圖都是通過海底測量的海底水深庫來形成,針對水深庫存在等特點,本文提出了一種從電子海圖提取水深,然後採用kriging方法進行插值形成字地圖的方法,該方法是進行地形匹配模擬研究的前提,而且它也是海底水深庫的一個補充。
  7. For wireless communications, direct sequence code division multiple access ( ds - cdma ) techniques have received a great deal of attention due to the expectation of capacity increase, interference rejection capability, security, and so on. in a high data rate application such as multimedia services, however, the capacity of ds - cdma systems is limited by both the inter - chip, or inter - symbol interference

    Cdma技術以其高抗干擾能力、高容量、高等技術優勢在第三代移動通信系統中被廣泛應用,然而在高速業務中,嚴重的碼間干擾和符號間干擾會導致系統能明顯下降。
  8. To protect the multimedia data, a mixed encryption algorithm together with two advanced cryptography - des ( data encryption standard ) and blowfish based on fingerprint watermark is studied. in this algorithm, the fingerprint data of people is embedded into the encrypted data

    為了對多媒體進行護,研究了一種基於指紋水印的混合加方案。該加方案中混合了流行的較高的des ( dataencryptionstandard )演算法和blowfish演算法。
  9. When we were designing the gis in cgis back in the 1960s, we had discussions amongst ourselves

    我們甚至在1970舉行的加拿大議會委員會上也討論了的問題,並且從那時候起一直都關注著這些問題。
  10. It is a promising technology and applied in a wide range of applications such as electronic street nameplate, ticketing system, automobile management, assembly line automation, due to its capability of dealing large scale data, high security, good anti - emi ( electro magnetic interference ) capability, fast response and low cost

    它具有量大,高,抗干擾能力強,識別時間短,費用較低等優點,有很好的應用前景,如:電子路牌、票務系統、車輛管理、自動化生產線管理等。
  11. Security needs are also driven by the marked rise in identity theft, by increased concerns about the privacy of personal data, and simply by general demand from customers and vendors

    身份竊取事件的顯著增多,人們對個人的日益關注,以及客戶和供應商的普遍需要,都導致了對安全的需要。
  12. In this paper, the encrypted intensity and digital verify capacity of secrecy transfers system has promoted a lot compared to wep. comparing to tkip, the speed is faster and also the agility is better

    本文傳輸系統的加強度和校驗能力相比wep來說有了很大提高,同tkip比,它的速度要快于tkip ,且它靈活要優于tkip 。
  13. The grid application needs to handle any and all requirements for authentication, access control, data integrity, confidentiality of data, and public and private key management

    網格應用程序需要處理所有的認證、訪問控制、一致數據保密性、公鑰私鑰管理等方面的需求。
  14. It offer data confidentiality, integrity, data source identity certification and anti - replay protective etc. safe service for network layer and its upper protocol

    它為ip層及其上層協議提供了、完整源身份認證、抗流量分析和反重放護等安全服務。
  15. This chapter provides design patterns for data confidentiality and data origin authentication

    本章為數據保密性來源的鑒定提供了設計模式。
  16. A rekeying method that can provide data confidentiality services and data integrity services is given

    碼協議提供數據保密性和完整服務。
  17. After several tests, it is showed that the system is reliable, flow measurement is accurate, and data ' s confidentiality and the system ' s anti - interference functions are very strong

    通過試驗,該智能渦街流量計系統運行可靠,流量測量準確,的顯示清晰明了,系統數據保密性能和抗干擾能力強。
  18. Under the open internet environment, three security mechanisms, including data confidentiality, identity authentication, and access control mechanism, must be realize when constructing logic secure subnet

    在開放的網際網路絡中,構建邏輯安全子網必須要實現三種安全機制:數據保密性機制、身份認證機制和訪問控制機制。
  19. For example, data confidentiality is a security service that can be implemented by the triple des encryption algorithm, the aes encryption algorithm, or by a number of other encryption algorithms

    安全服務通常可以通過多個不同的加演算法實現。例如,數據保密性是可以通過三重des加演算法、 aes加演算法或其他加演算法實現的安全服務。
  20. According to the characteristices of network manufacture system, this paper analyses its security problem such as identity authentication, data encryption, data integrality authentication. this paper brings forword a resolvent based on ipsec vpn for network manufacture system security problem

    本文根網路化製造系統的特點,分析了網路化製造系統的網路安全需求,包括身份認證、數據保密性完整等問題,以ipsecvpn技術為基礎,提出了一種適合網路化製造系統的安全解決方案。
分享友人