機密性協定 的英文怎麼說

中文拼音 [xìngxiédìng]
機密性協定 英文
confidentiality agreement
  • : machineengine
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ形容詞1 (平靜; 穩定) calm; stable 2 (已經確定的; 不改變的) fixed; settled; established Ⅱ動詞...
  • 機密性 : confidentiality
  • 機密 : 1 (重要而秘密的) secret; classified; confidential; privacy 2 (機密的事)secret:泄漏機密divulge...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般的安全防護措施:存取控制、標識和認證、完整控制、碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算病毒防護和抗抵賴議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Based - w on uml, we use uml extend mechanism to process specific property develop about workflow : customize stereotype such as contract, port, collaborate, etc. and set up contract hierarchical system structure. for strict mathematical analysis and simulation, we also provide a convertible mechanism from uml model to object petri nets and a object petri nets ? formal analysis method. analyze the complicated dynamic relation among wofld7low ( work item ) in distributed workflow system by object petri nets ? strong analysis and simulation capability

    我們以uml為基礎,利用uml的擴展制進行了有關工作流特的擴展:製了合同、埠、通訊議塊等版類,建立了合同化的層次體系結構;為了對建立的模型進行嚴的數學分析和模擬,我們又提供了從uml模型到對象petri網的轉換制和對象petri網的形式化分析方法,利用對象petri網強勁的分析模擬能力來分析分散式工作流系統中工作流(工作任務)之間的復雜的動態關系;根據分析結果可以對模型進行有效地改進,最後確的模型容易實現到程序代碼的轉換。
  3. Korean enterprises should take following countermeasures : an effort to get access to china ' s service markets, deepening the composition of export commodities, focusing on upgrading industries etc. part v deals with the perspective of sino - korean trade, holding there are underpinnings of mutual advantages and there is a bright future for trade as long as institutional and policy blocks are removed. finally, some schemes are raised for further opening markets in china : a midvlong term strategic act to advance towards china ' s market, closer contact with local governments, expansion of sino - korean technological trade, flexible employment of edcf, overseas investment capital and capital of international financial institutions and international financial markets, market segmentation from regional features in china, fostering skill - intensive industries instead of pure processing industries, establishment of more joint ventures to lighten the burden on capital etc

    文章的最後為韓國進一步開辟中國市場提出了若干方案:韓國要把進軍中國市場看作一項中長期的戰略舉措;投資到中國的企業應集中開辟中國原輔材料的出口和1產品:加強與地方政府的接觸,實現出口線多變化;大力發展韓中兩國的技術貿易;靈活的利用經濟開發作基金( edcf ) ,海外投資資金及國際金融構和國際金融市場資金;根據中國的地域特徵進行市場分割,利用地方政府的經濟自主權制出經濟作方案;韓國對中國的投資要從單純的加工業解脫出來,發展技術集型的產業;多設立合資企業,合作投資可能更減少對資金的負擔。
  4. Independent is to keep some distance between countrymen associations and governments. constructive means that countrymen associations are asked to have constructive organs and systems of their own. public and legal are to make bounds between countrymen associations and secret or gangland organizations

    非政治使農民會與政黨或政治團體相區別;公益使農民會與企業組織相區別;自主使農民會與政府保持一距離;組織化要求建立農民會的組織構和組織體系;公開和合法把農民會與秘社團或黑社會組織劃清了界限。
  5. It receives credentials coming from ipsec entity. through its policy compliance checking to verify whether these credential are trustable, so determine whether these acts were authorized and under what conditions will be permitted. this kind of function will be very useful in the procession of resolving conflicts between different ipsec entities policies. in the light of such theory, the thesis developed an ipsec policy system based on the keynote which is the realization of “ trust management ”

    通過一致檢驗構接收ipsec提交的安全策略與ipsec自身信任的安全策略相比進行一致檢驗,從而確了該ipsec的商過程是否符合「信任管理「的規范,也就確該行為是否被許可以及在何種限制條件下的許可。這樣就進一步解決了安全策略沖突的問題。本文就是在此理論基礎上初步實現了一個基於keynote信任管理的ipsec策略管理系統。
  6. But in more situations the random variables generating counting processes may not independent identically distributed, and in all kinds of dependent relations, negative association ( na ) and positive association ( pa ) are commonly seen. the research and apply in this aspect are rather valuable. in chap 2 we prove wald inequalities and fundamental renewal theorems of renewal counting processes generated by na sequences and pa sequences ; in chap 3 we are enlightened by cheng and wang [ 8 ], extend some results in gut and steinebach [ 7 ], obtain the precise asymptotics for renewal counting processes and depict the convergence rate and limit value of renewal counting processes precisely ; at last, in the study of na sequences, su, zhao and wang ( 1996 ) [ 9 ], lin ( 1997 ) [ 10 ] have proved the weak convergence for partial sums of stong stationary na sequences. however product sums are the generalization of partial sums and also the special condition of more general u - statistic

    但在更多的場合中,構成計數過程的隨變量未必相互獨立,而在各種相依關系中,負相( na )和正相( pa )是頗為常見的關系,這方面的研究和應用也是頗有價值的,本文的第二章證明了na列和pa列構成的更新計數過程的wald不等式和基本更新理的一些初步結果;本文的第三章則是受到cheng和wang [ 8 ]的啟發,推廣了gut和steinebach [ 7 ] )中的一些結論,從而得到了更新計數過程在一般吸引場下的精緻漸近,對更新計數過程的收斂速度及極限狀態進行精緻的刻畫;最後,在有關na列的研究中,蘇淳,趙林成和王岳寶( 1996 ) 》 [ 9 ] ,林正炎( 1997 ) [ 10 ]已經證明了強平穩na列的部分和過程的弱收斂,而乘積和是部分和的一般化,也是更一般的u統計量的特況,它與部分和有許多切的聯系又有一些實質的區別,因此,本文的第四章就將討論強平穩na列的乘積和過程的弱收斂,因為計數過程也是一種部分和,也可以構成乘積和,這個結果為研究計數過程的弱收斂作了一些準備。
  7. My study involves two areas in quantum key distribution protocol. first, in the field of the b92 protocol, it is first calculated and analyzed for the holevo upper bound of b92 protocol to noise and eavesdropping, the fidelity, a lower bound on the guaranteed privacy and the capacity for classical information over phase flip channels. it is computed and validated for that projective measurements increase quantum entropy

    本文主要涉及兩個方面:一、 b92量子鑰分配議方面,計算分析了b92議對噪聲和竊聽的holevo上界,以及通過相位翻轉通道的通道保真度,通道可靠的保量子熵下界和對經典信息的容量,計算驗證了理投影測量增加量子熵,分析了測量前後量子狀態的變化,並用計算模擬繪制了圖形,能夠清楚直觀地分析比較。
  8. In no event will 2000fun be liable for any damages caused by subscriber s failure to perform subscriber s obligation or for any loss of use, loss of time, inconvenience, commercial loss, loss of profits or savings, costs or expenses or other incidental or consequential damages howsoever arising, whether in contract, or in tort and whether resulting from interference with transmission for any cause whatsoever, over - loading, negligence or strict liability in tort or by reason of any act, omission or default of 2000fun, it s employee, agent consultant or contractor

    2嚴禁所有用戶利用2000fun的網路設備從事不法活動,包括派發傳送和刊登商業淫褻侵權物品,或其它法律上被評為恐嚇和淫褻不雅的物品,若違法,們將會立即終止服務議,並不作另行通知,若因此對2000fun造成任何損失,客戶需負全部責任並賠償損失。 3嚴禁用戶利用2000fun的網路設備發放大量的宣傳電郵。
  9. Such information, documents or other materials obtained or communicated under this agreement shall be afforded in the receiving country the same protection in respect of confidentiality and official secrecy as applies in that country to the same kind of information, documents and other materials obtained in its own territory

    二、依據本所獲取的任何情報、文件和其他資料,其和公務上的保均應得到獲取國在本國境內取得的同類情報、文件和其他資料應受到的相同程度的保護。
分享友人