機密性 的英文怎麼說
中文拼音 [jīmìxìng]
機密性
英文
confidentiality-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。Chapter 3, introduces the cryptogram technology which the e - signature stamper system will use
其中,數字簽名技術尤為重要,它是提供信息完整性、機密性、不可抵賴性的基礎。In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control
模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。Direct printing authority is given to bureaux and departments to procure from outside contractors printing items of a non - classified nature with value below 20, 000
各部門已獲授直接印刷權,向外間承辦商采購20 , 000元以下非機密性質的印刷品。The paper mainly designs the electronic official document transport system, analyzes the framework, key technologies and securities. this paper put forward to the scheme about these key technologies, such as the user ' s certificate exchange, secret key management, red - header document and seal processing, files " inputting, and datum compressing. the paper introduces the detailed implement of the project with a demonstration
對電子公文傳輸系統的功能需求、關鍵技術以及安全性進行了深入研究和分析,本文重點對電子公文系統中的傳輸子系統作了詳細的需求分析和系統結構設計,該設計全面考慮了電子公文在傳輸過程以及收發文過程的機密性、完整性、真實性以及不可否認性等特性,提出保障系統的機密性、完整性、真實性及不可否認性的解決方案。Although a facsimile system can easily handle statements of account and tables of statistics, it is less confidential than transmission by letter
雖然傳真能夠方便的處理對帳單和統計表格,但是沒有信函那麼有機密性。The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough
論述了ipsec在ip報文的完整性、機密性、數據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加密和認證演算法、密鑰管理等如何合作,共同完成對ip報文的安全保護。Higher security level is required while more and more commerce activities and government affairs are done over lntemet. the authentication of activity paticipates, the confidential ofdat4 the integrity of data and the ability to anti - disavow are the most important ones among all security requirements
利用開放式網路開展商務和政務活動對網路的安全性提出了更高的要求,最為重要的安全性要求包括:參與方的身份認證,會話的機密性,會話的完整性和抗抵賴性。Any information which is by nature confidential ( for example, because its disclosure would be of significant competitive advantage to a competitor or because its disclosure would have a significantly adverse effect upon a person supplying the information or upon a person from whom the supplier acquired the information ), or which is provided on a confidential basis by parties to an investigation shall, upon good cause shown, be treated a such by the authorities
任何原屬機密性質的信息(例如,由於信息的披露會給予一競爭者巨大的競爭優勢,或由於信息的披露會給信息披露者或給向信息獲得者提供信息的人士帶來嚴重不利影響) ,或由調查參加方在保密基礎上提供的信息,主管機關應在對方說明正當原因后,按機密信息處理。Pki is a transparent and seamless platform for the network system provided the service of confidentiality, integrity, authentication and non - repudiation, while ca is a necessary and important component in pki, pki ' s modules, functions and its applications are firstly described in this dissertation, with specially emphases on the issuing certificates, issuance mechanisms of revoked certificates, message format and hierarchy of cas as well as the performance of the system
Pki可以為網路上的各種應用提供機密性、完整性、身份鑒別和不可抵賴性的安全保障,簽證機關是pki系統中的重要組件。本文闡述了pki系統的模型、功能和應用,重點討論了簽證機關的證書發布、層次結構、消息格式、撤銷證書的發布機制等問題,以及它們對系統性能的影響。Some security measures for registries, which deal with authentication, integrity and confidentiality, are also covered in the specification of ebxml released in may 2001
,包括了一些登記處的保安措施。這些措施主要是解決認證完整性和機密性等保安要求。Confidentiality, authenticity, integrity and non - repudiation of the message
訊息的機密性真確性完整性及不可否定性You acknowledge and confirm that the internet is not a secure medium where privacy can be ensured, and that complete security and confidentiality over the internet is not possible at this time
閣下表示知悉並確認,網際網路並非可以確保穩私的安全媒介,且目前網上無法做到完全安全及保密。本公司並不能保證使用本網站之機密性。With encryption, mr. lam can be assured that the contents of the exam. paper will be kept from the prying eyes of unauthorised parties
利用加密技術,林老師可保障訊息的機密性,確保考試卷不會被未獲授權的人讀取。A set of access control system is proposed to achieve the requirements of both electrons government affairs and securities and integrity ; these performances are realized in c + + and the system has put into use
提出並實現一套訪問控制系統使其既能滿足現實電子政務的應用要求,又能滿足信息的機密性和完整性要求;用c + +語言實現以上的全部功能,此系統已在中船重工集團獲得使用。" while the pki is still recognised as the most mature technology available to address the full range of authentication, confidentiality, integrity and non - repudiation issues of electronic transactions, and the e - cert can be used in a broad range of e - government and e - commerce transactions, most of the applications are used only by a small segment of the population and its use at the individual level is mostly optional, " mrs fung explained
公鑰基建在處理電子交易所涉及的真確性、機密性、數據完整性及不可否定性等問題上,仍被公認為是現時最成熟的科技,而電子證書亦已可應用於多種電子政府及電子商業交易。然而,大部分應用方案仍只為小部分市民使用,在個人層面上亦多數只是其中一種可供選擇的認證方法。Direct printing authority is given to bureaux and departments to procure from outside contractors printing items of a non - classified nature with value below $ 20, 000
各部門已獲授直接印刷權,向外間承辦商采購20 , 000元以下非機密性質的印刷品。The system not only resolves the principals authentication but also assures the confidentiality and integrity of the user " s lived fingerprint in the network system
該系統不但解決了通信雙方的雙向認證問題,而且解決了用戶活體指紋特徵等認證信息通過網路傳輸的機密性和完整性問題。When constructing countrywide production & management decision support system of tobacco industry, there are security questions in data integrity, secrecy, irreversibility, and identity authentication authorization
在構建全國煙草行業卷煙生產經營決策信息系統(簡稱國家煙草一號工程)中,存在數據完整性、機密性、不可否認性及身份認證授權等安全問題。It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication
通過ah和esp協議來以下的安全服務:訪問控制,無連接完整性,數據源認證,重放攻擊保護,機密性和有限的通信流保密性。分享友人