數據保密 的英文怎麼說

中文拼音 [shǔbǎo]
數據保密 英文
data confidentiality
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 數據 : data; record; information
  1. Security needs are also driven by the marked rise in identity theft, by increased concerns about the privacy of personal data, and simply by general demand from customers and vendors

    身份竊取事件的顯著增多,人們對個人數據保密的日益關注,以及客戶和供應商的普遍需要,都導致了對安全性的需要。
  2. In data security, the unauthorized searching of data held on a computer for information ( e. g. confidential data or proprietary software )

    數據保密技術中,未經許可而對存在計算機中的(例如機或有專利權的軟體)進行搜索,以求獲取信息。
  3. In data security, the transmission of data to unauthorized users by processes with legitimate access to data. a compiler, for example, could leak a proprietary program whilst it is being compiled

    數據保密學中,通過合法訪問的進程將傳輸給未授權的用戶的過程。例如,編譯程序在編譯期間便可能泄漏專用程序。
  4. In this paper, the encrypted intensity and digital verify capacity of secrecy transfers system has promoted a lot compared to wep. comparing to tkip, the speed is faster and also the agility is better

    本文數據保密傳輸系統的加強度和校驗能力相比wep來說有了很大提高,同tkip比,它的速度要快于tkip ,且它靈活性要優于tkip 。
  5. The grid application needs to handle any and all requirements for authentication, access control, data integrity, confidentiality of data, and public and private key management

    網格應用程序需要處理所有的認證、訪問控制、一致性、數據保密性、公鑰私鑰管理等方面的需求。
  6. We take the issue of confidentiality and data protection extremely seriously and the chosen outsourcer is contractually obliged to do likewise

    我們會嚴肅地對待這些信息並遵循數據保密準則。而且被我們選中的外包服務公司也將依合同負有此義務。
  7. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    散列字簽名演算法利用rsa公鑰碼體制的原理、 md5單向散列函和排列碼加的思想,構造了一種能夠快速實現數據保密字簽名的簽名方案。
  8. In data security, the transmission of data to unauthorized users by processes with legitimate access to data

    數據保密學中,通過合法訪問的進程將傳輸給未授權的用戶的過程。
  9. This chapter provides design patterns for data confidentiality and data origin authentication

    本章為數據保密性和來源的鑒定提供了設計模式。
  10. A rekeying method that can provide data confidentiality services and data integrity services is given

    碼協議提供數據保密性和完整性服務。
  11. Finally, chaotic digital sequences were applied to secrecy comrnunication among ic card system. the system model was designed and a simulation analysis for the secrecy coininunication with computer was also given

    最後,從安全通信的角度考慮,提出將混沌字序列應用於讀卡器系統的數據保密通信中去,並設計了實現模型,進行了計算機通信模擬模擬。
  12. After several tests, it is showed that the system is reliable, flow measurement is accurate, and data ' s confidentiality and the system ' s anti - interference functions are very strong

    通過試驗,該智能渦街流量計系統運行可靠,流量測量準確,的顯示清晰明了,系統數據保密性能和抗干擾能力強。
  13. Under the open internet environment, three security mechanisms, including data confidentiality, identity authentication, and access control mechanism, must be realize when constructing logic secure subnet

    在開放的網際網路絡中,構建邏輯安全子網必須要實現三種安全機制:數據保密性機制、身份認證機制和訪問控制機制。
  14. For example, data confidentiality is a security service that can be implemented by the triple des encryption algorithm, the aes encryption algorithm, or by a number of other encryption algorithms

    安全服務通常可以通過多個不同的加演算法實現。例如,數據保密性是可以通過三重des加演算法、 aes加演算法或其他加演算法實現的安全服務。
  15. According to the characteristices of network manufacture system, this paper analyses its security problem such as identity authentication, data encryption, data integrality authentication. this paper brings forword a resolvent based on ipsec vpn for network manufacture system security problem

    本文根網路化製造系統的特點,分析了網路化製造系統的網路安全需求,包括身份認證、數據保密性、完整性等問題,以ipsecvpn技術為基礎,提出了一種適合網路化製造系統的安全解決方案。
  16. Wireless features : data privacy

    無線電通信特徵:數據保密
  17. Consider the need for authentication, authorization, data privacy, and data integrity requirements

    考慮身份驗證、授權、數據保密集成的需求。
  18. In real wireless network application environment, these technologies must be combined to integral secure transport protocol to implement data encryption and authentication

    而在真正的無線網路應用環境中,需要把兩者結合起來,形成完整的安全傳輸協議,以實現數據保密、身份認證等功能。
  19. All our employees who have access to, and are associated with the processing of personal data, are obliged to respect the confidentiality of official business matters, including personal data

    責成能存取個人以及與處理個人有關的所有雇員遵守官方公務的原則,包括對個人數據保密
  20. With the development of the internet, the security of computer security is playing an important role. one means of providing security in communications is though encryption

    隨著計算機聯網的逐步普及,計算機信息的問題顯得越來越重要。數據保密變換,或碼技術,是對計算機信息進行護的最實用和最可靠的方法。
分享友人