數據保密 的英文怎麼說
中文拼音 [shǔjùbǎomì]
數據保密
英文
data confidentiality- 數 : 數副詞(屢次) frequently; repeatedly
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 保 : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 數據 : data; record; information
-
Security needs are also driven by the marked rise in identity theft, by increased concerns about the privacy of personal data, and simply by general demand from customers and vendors
身份竊取事件的顯著增多,人們對個人數據保密的日益關注,以及客戶和供應商的普遍需要,都導致了對安全性的需要。In data security, the unauthorized searching of data held on a computer for information ( e. g. confidential data or proprietary software )
在數據保密技術中,未經許可而對保存在計算機中的數據(例如機密數據或有專利權的軟體)進行搜索,以求獲取信息。In data security, the transmission of data to unauthorized users by processes with legitimate access to data. a compiler, for example, could leak a proprietary program whilst it is being compiled
在數據保密學中,通過合法訪問數據的進程將數據傳輸給未授權的用戶的過程。例如,編譯程序在編譯期間便可能泄漏專用程序。In this paper, the encrypted intensity and digital verify capacity of secrecy transfers system has promoted a lot compared to wep. comparing to tkip, the speed is faster and also the agility is better
本文數據保密傳輸系統的加密強度和數據校驗能力相比wep來說有了很大提高,同tkip比,它的速度要快于tkip ,且它靈活性要優于tkip 。The grid application needs to handle any and all requirements for authentication, access control, data integrity, confidentiality of data, and public and private key management
網格應用程序需要處理所有的認證、訪問控制、數據一致性、數據保密性、公鑰私鑰管理等方面的需求。We take the issue of confidentiality and data protection extremely seriously and the chosen outsourcer is contractually obliged to do likewise
我們會嚴肅地對待這些信息並遵循數據保密準則。而且被我們選中的外包服務公司也將依據合同負有此義務。The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time
保密散列數字簽名演算法利用rsa公鑰密碼體制的原理、 md5單向散列函數和排列碼加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。In data security, the transmission of data to unauthorized users by processes with legitimate access to data
在數據保密學中,通過合法訪問數據的進程將數據傳輸給未授權的用戶的過程。This chapter provides design patterns for data confidentiality and data origin authentication
本章為數據保密性和數據來源的鑒定提供了設計模式。A rekeying method that can provide data confidentiality services and data integrity services is given
該密碼協議提供數據保密性和完整性服務。Finally, chaotic digital sequences were applied to secrecy comrnunication among ic card system. the system model was designed and a simulation analysis for the secrecy coininunication with computer was also given
最後,從安全通信的角度考慮,提出將混沌數字序列應用於讀卡器系統的數據保密通信中去,並設計了實現模型,進行了計算機保密通信模擬模擬。After several tests, it is showed that the system is reliable, flow measurement is accurate, and data ' s confidentiality and the system ' s anti - interference functions are very strong
通過試驗,該智能渦街流量計系統運行可靠,流量測量準確,數據的顯示清晰明了,系統數據保密性能和抗干擾能力強。Under the open internet environment, three security mechanisms, including data confidentiality, identity authentication, and access control mechanism, must be realize when constructing logic secure subnet
在開放的網際網路絡中,構建邏輯安全子網必須要實現三種安全機制:數據保密性機制、身份認證機制和訪問控制機制。For example, data confidentiality is a security service that can be implemented by the triple des encryption algorithm, the aes encryption algorithm, or by a number of other encryption algorithms
安全服務通常可以通過多個不同的加密演算法實現。例如,數據保密性是可以通過三重des加密演算法、 aes加密演算法或其他加密演算法實現的安全服務。According to the characteristices of network manufacture system, this paper analyses its security problem such as identity authentication, data encryption, data integrality authentication. this paper brings forword a resolvent based on ipsec vpn for network manufacture system security problem
本文根據網路化製造系統的特點,分析了網路化製造系統的網路安全需求,包括身份認證、數據保密性、數據完整性等問題,以ipsecvpn技術為基礎,提出了一種適合網路化製造系統的安全解決方案。Wireless features : data privacy
無線電通信特徵:數據保密Consider the need for authentication, authorization, data privacy, and data integrity requirements
考慮身份驗證、授權、數據保密和數據集成的需求。In real wireless network application environment, these technologies must be combined to integral secure transport protocol to implement data encryption and authentication
而在真正的無線網路應用環境中,需要把兩者結合起來,形成完整的安全傳輸協議,以實現數據保密、身份認證等功能。All our employees who have access to, and are associated with the processing of personal data, are obliged to respect the confidentiality of official business matters, including personal data
責成能存取個人數據以及與處理個人數據有關的所有雇員遵守官方公務的保密原則,包括對個人數據保密。With the development of the internet, the security of computer security is playing an important role. one means of providing security in communications is though encryption
隨著計算機聯網的逐步普及,計算機信息的保密問題顯得越來越重要。數據保密變換,或密碼技術,是對計算機信息進行保護的最實用和最可靠的方法。分享友人