機密性 的英文怎麼說

中文拼音 [xìng]
機密性 英文
confidentiality
  • : machineengine
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 機密 : 1 (重要而秘密的) secret; classified; confidential; privacy 2 (機密的事)secret:泄漏機密divulge...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠、交易者身份的真實、數據電訊的機密性和完整、數據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證構,第五章介紹了信息加技術以及各國立法對碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴
  2. Chapter 3, introduces the cryptogram technology which the e - signature stamper system will use

    其中,數字簽名技術尤為重要,它是提供信息完整機密性、不可抵賴的基礎。
  3. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主無關,有效的防範了身份證書和鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整
  4. Direct printing authority is given to bureaux and departments to procure from outside contractors printing items of a non - classified nature with value below 20, 000

    各部門已獲授直接印刷權,向外間承辦商采購20 , 000元以下非機密性質的印刷品。
  5. The paper mainly designs the electronic official document transport system, analyzes the framework, key technologies and securities. this paper put forward to the scheme about these key technologies, such as the user ' s certificate exchange, secret key management, red - header document and seal processing, files " inputting, and datum compressing. the paper introduces the detailed implement of the project with a demonstration

    對電子公文傳輸系統的功能需求、關鍵技術以及安全進行了深入研究和分析,本文重點對電子公文系統中的傳輸子系統作了詳細的需求分析和系統結構設計,該設計全面考慮了電子公文在傳輸過程以及收發文過程的機密性、完整、真實以及不可否認等特,提出保障系統的機密性、完整、真實及不可否認的解決方案。
  6. Although a facsimile system can easily handle statements of account and tables of statistics, it is less confidential than transmission by letter

    雖然傳真能夠方便的處理對帳單和統計表格,但是沒有信函那麼有機密性
  7. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的完整機密性、數據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加和認證演算法、鑰管理等如何合作,共同完成對ip報文的安全保護。
  8. Higher security level is required while more and more commerce activities and government affairs are done over lntemet. the authentication of activity paticipates, the confidential ofdat4 the integrity of data and the ability to anti - disavow are the most important ones among all security requirements

    利用開放式網路開展商務和政務活動對網路的安全提出了更高的要求,最為重要的安全要求包括:參與方的身份認證,會話的機密性,會話的完整和抗抵賴
  9. Any information which is by nature confidential ( for example, because its disclosure would be of significant competitive advantage to a competitor or because its disclosure would have a significantly adverse effect upon a person supplying the information or upon a person from whom the supplier acquired the information ), or which is provided on a confidential basis by parties to an investigation shall, upon good cause shown, be treated a such by the authorities

    任何原屬機密性質的信息(例如,由於信息的披露會給予一競爭者巨大的競爭優勢,或由於信息的披露會給信息披露者或給向信息獲得者提供信息的人士帶來嚴重不利影響) ,或由調查參加方在保基礎上提供的信息,主管關應在對方說明正當原因后,按信息處理。
  10. Pki is a transparent and seamless platform for the network system provided the service of confidentiality, integrity, authentication and non - repudiation, while ca is a necessary and important component in pki, pki ' s modules, functions and its applications are firstly described in this dissertation, with specially emphases on the issuing certificates, issuance mechanisms of revoked certificates, message format and hierarchy of cas as well as the performance of the system

    Pki可以為網路上的各種應用提供機密性、完整、身份鑒別和不可抵賴的安全保障,簽證關是pki系統中的重要組件。本文闡述了pki系統的模型、功能和應用,重點討論了簽證關的證書發布、層次結構、消息格式、撤銷證書的發布制等問題,以及它們對系統能的影響。
  11. Some security measures for registries, which deal with authentication, integrity and confidentiality, are also covered in the specification of ebxml released in may 2001

    ,包括了一些登記處的保安措施。這些措施主要是解決認證完整機密性等保安要求。
  12. Confidentiality, authenticity, integrity and non - repudiation of the message

    訊息的機密性真確完整及不可否定
  13. You acknowledge and confirm that the internet is not a secure medium where privacy can be ensured, and that complete security and confidentiality over the internet is not possible at this time

    閣下表示知悉並確認,網際網路並非可以確保穩私的安全媒介,且目前網上無法做到完全安全及保。本公司並不能保證使用本網站之機密性
  14. With encryption, mr. lam can be assured that the contents of the exam. paper will be kept from the prying eyes of unauthorised parties

    利用加技術,林老師可保障訊息的機密性,確保考試卷不會被未獲授權的人讀取。
  15. A set of access control system is proposed to achieve the requirements of both electrons government affairs and securities and integrity ; these performances are realized in c + + and the system has put into use

    提出並實現一套訪問控制系統使其既能滿足現實電子政務的應用要求,又能滿足信息的機密性和完整要求;用c + +語言實現以上的全部功能,此系統已在中船重工集團獲得使用。
  16. " while the pki is still recognised as the most mature technology available to address the full range of authentication, confidentiality, integrity and non - repudiation issues of electronic transactions, and the e - cert can be used in a broad range of e - government and e - commerce transactions, most of the applications are used only by a small segment of the population and its use at the individual level is mostly optional, " mrs fung explained

    公鑰基建在處理電子交易所涉及的真確機密性、數據完整及不可否定等問題上,仍被公認為是現時最成熟的科技,而電子證書亦已可應用於多種電子政府及電子商業交易。然而,大部分應用方案仍只為小部分市民使用,在個人層面上亦多數只是其中一種可供選擇的認證方法。
  17. Direct printing authority is given to bureaux and departments to procure from outside contractors printing items of a non - classified nature with value below $ 20, 000

    各部門已獲授直接印刷權,向外間承辦商采購20 , 000元以下非機密性質的印刷品。
  18. The system not only resolves the principals authentication but also assures the confidentiality and integrity of the user " s lived fingerprint in the network system

    該系統不但解決了通信雙方的雙向認證問題,而且解決了用戶活體指紋特徵等認證信息通過網路傳輸的機密性和完整問題。
  19. When constructing countrywide production & management decision support system of tobacco industry, there are security questions in data integrity, secrecy, irreversibility, and identity authentication authorization

    在構建全國煙草行業卷煙生產經營決策信息系統(簡稱國家煙草一號工程)中,存在數據完整機密性、不可否認及身份認證授權等安全問題。
  20. It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication

    通過ah和esp協議來以下的安全服務:訪問控制,無連接完整,數據源認證,重放攻擊保護,機密性和有限的通信流保
分享友人