數據保密性 的英文怎麼說
中文拼音 [shǔjùbǎomìxìng]
數據保密性
英文
dc data confidentiality- 數 : 數副詞(屢次) frequently; repeatedly
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 保 : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 數據 : data; record; information
-
Some features of this chip are listed below : firstly, it opts for ir data transmit technology, so it have the advantages of little emi, simple operation, low cost, etc. secondly, the synchrony method makes it have good noise suppression and ber quality
該「紅外名片交換專用晶元」能獨立完成名片交換和管理的任務,具有顯著優點: 1採用紅外數據通信的方式,具有技術方案成熟,交換方法簡單,保密性好,相互電磁干擾小,成本低、簡單易用等優點。Under most civil tax laws, tax returns and most civil enforcement actions have some degree of confidentiality from public scrutiny
根據大多數民事稅收法律規范,納稅申報表和大多數的民事強制執行案件都有一定程度的保密性,不對公眾公開。Compared with traditional communication networks, a data communication network has the advantages of digitalized data, broad bandwidth, intelligent systems, networking structures, integrated services, strong anti - interference and high security. it can provide various communication services with uniform platforms, which are what the telecommunication owners have built up or / and are building
數據通信網與傳統通信網相比具有數字化、寬帶化、智能化、網路化、綜合化、抗干擾能力強、保密性強等特點,而且能夠為各種通信業務提供統一的平臺,這也是各個電信運營商目前在建或建設完成的網路平臺。5 ) for fsca introduce the distributed model named corba over ssl, it is well extensible and secret in transmission
5 )採用corbaoverssl的分散式模型。 fsca具有良好的數據傳輸保密性和系統可擴展性。The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives
「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。The digital map is usually formed by the water depth ' s database measured on the seabottom. because of the disadvantage that the database is kept secret, this dissertation introduces a new method : first, the depth data are picked up from the electronic chart, then interpolation of the depth datum by kriging algorithm is adopted to gain the digital map. the method is the precondition of the terrain matching when it is researched by simulation, and it is the complement of the database
通常數字地圖都是通過海底測量的海底水深數據庫來形成,針對水深數據庫存在保密性等特點,本文提出了一種從電子海圖提取水深數據,然後採用kriging方法進行插值形成數字地圖的方法,該方法是進行地形匹配模擬研究的前提,而且它也是海底水深數據庫的一個補充。For wireless communications, direct sequence code division multiple access ( ds - cdma ) techniques have received a great deal of attention due to the expectation of capacity increase, interference rejection capability, security, and so on. in a high data rate application such as multimedia services, however, the capacity of ds - cdma systems is limited by both the inter - chip, or inter - symbol interference
Cdma技術以其高抗干擾能力、高容量、高保密性等技術優勢在第三代移動通信系統中被廣泛應用,然而在高速數據業務中,嚴重的碼間干擾和符號間干擾會導致系統性能明顯下降。To protect the multimedia data, a mixed encryption algorithm together with two advanced cryptography - des ( data encryption standard ) and blowfish based on fingerprint watermark is studied. in this algorithm, the fingerprint data of people is embedded into the encrypted data
為了對多媒體數據進行保護,研究了一種基於指紋水印數據的混合加密方案。該加密方案中混合了流行的保密性較高的des ( dataencryptionstandard )演算法和blowfish演算法。When we were designing the gis in cgis back in the 1960s, we had discussions amongst ourselves
我們甚至在1970舉行的加拿大議會委員會上也討論了數據的保密性的問題,並且從那時候起一直都關注著這些問題。It is a promising technology and applied in a wide range of applications such as electronic street nameplate, ticketing system, automobile management, assembly line automation, due to its capability of dealing large scale data, high security, good anti - emi ( electro magnetic interference ) capability, fast response and low cost
它具有數據量大,保密性高,抗干擾能力強,識別時間短,費用較低等優點,有很好的應用前景,如:電子路牌、票務系統、車輛管理、自動化生產線管理等。Security needs are also driven by the marked rise in identity theft, by increased concerns about the privacy of personal data, and simply by general demand from customers and vendors
身份竊取事件的顯著增多,人們對個人數據保密的日益關注,以及客戶和供應商的普遍需要,都導致了對安全性的需要。In this paper, the encrypted intensity and digital verify capacity of secrecy transfers system has promoted a lot compared to wep. comparing to tkip, the speed is faster and also the agility is better
本文數據保密傳輸系統的加密強度和數據校驗能力相比wep來說有了很大提高,同tkip比,它的速度要快于tkip ,且它靈活性要優于tkip 。The grid application needs to handle any and all requirements for authentication, access control, data integrity, confidentiality of data, and public and private key management
網格應用程序需要處理所有的認證、訪問控制、數據一致性、數據保密性、公鑰私鑰管理等方面的需求。It offer data confidentiality, integrity, data source identity certification and anti - replay protective etc. safe service for network layer and its upper protocol
它為ip層及其上層協議提供了數據機密性、完整性、數據源身份認證、抗流量分析和反重放保護等安全服務。This chapter provides design patterns for data confidentiality and data origin authentication
本章為數據保密性和數據來源的鑒定提供了設計模式。A rekeying method that can provide data confidentiality services and data integrity services is given
該密碼協議提供數據保密性和完整性服務。After several tests, it is showed that the system is reliable, flow measurement is accurate, and data ' s confidentiality and the system ' s anti - interference functions are very strong
通過試驗,該智能渦街流量計系統運行可靠,流量測量準確,數據的顯示清晰明了,系統數據保密性能和抗干擾能力強。Under the open internet environment, three security mechanisms, including data confidentiality, identity authentication, and access control mechanism, must be realize when constructing logic secure subnet
在開放的網際網路絡中,構建邏輯安全子網必須要實現三種安全機制:數據保密性機制、身份認證機制和訪問控制機制。For example, data confidentiality is a security service that can be implemented by the triple des encryption algorithm, the aes encryption algorithm, or by a number of other encryption algorithms
安全服務通常可以通過多個不同的加密演算法實現。例如,數據保密性是可以通過三重des加密演算法、 aes加密演算法或其他加密演算法實現的安全服務。According to the characteristices of network manufacture system, this paper analyses its security problem such as identity authentication, data encryption, data integrality authentication. this paper brings forword a resolvent based on ipsec vpn for network manufacture system security problem
本文根據網路化製造系統的特點,分析了網路化製造系統的網路安全需求,包括身份認證、數據保密性、數據完整性等問題,以ipsecvpn技術為基礎,提出了一種適合網路化製造系統的安全解決方案。分享友人