私用碼 的英文怎麼說

中文拼音 [yòng]
私用碼 英文
private code
  • : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 私用 : appropriatio
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定戶的權力和責任,包括帳戶使方式、資源訪問權限、口令應以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使權限、口令管理、審計和監控、備份以及個人隱等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應方面提供了基本的框架。
  2. Pw private key is encrypted by a user - defined password

    Pw =使戶定義的密加密
  3. To deal with the question that how we can guarantee the dna sequences which are stored in the personal dna database are anonymous, that no one can find out whom a special dna sequence is collected from, this paper get a new method ? savior, by improve dnala ( dna lattice anonymization ), which is a method settling this question. savior replaces the multiple alignment in dnala with pairwise alignment between every tow sequences, and replaces the greedy algorithm in dnala with stochastic hill - climbing. for doing this, it can save the time for data pretreatment, and add the precision of classing

    針對個人dna數據的隱保護問題,即:如何保證無法將存儲在數據庫中的dna序列信息與其提供者的個人身份信息(如:姓名,身份證號等)聯系起來,本文對一種新近開發的隱保護方法? dnala ( dnalatticeanonymization )進行了改進,在數據預處理階段,兩兩雙序列比對代替了原演算法中的多序列比對,在不降低處理精度的情況下減少了數據預處理所耗費的時間;隨機爬山法代替了原演算法中的貪心策略,增加了演算法後期處理的精度,從而形成了一種新的演算法? savior 。
  4. Typically, secret - key algorithms, called block ciphers, are used to encrypt one block of data at a time

    通常,鑰演算法(稱為塊密於一次加密一個數據塊。
  5. One of the reasons that public private key schemes have revolutionized digital security is because the sender and receiver don t have to share a common password

    公鑰/鑰模式徹底改變了數字安全的原因之一是,發送者和接收者不必再共享一個通的密
  6. By ray spencer secure computing corporation, stephen smalley, peter loscocco national security agency, mike hibler, david andersen, and jay lepreau university of utah

    (完整地輸入)並且在被提示時輸入密短語(如果正在使) 。您可以這樣的方式生成所有可能的公鑰鑰對。
  7. Going to court to uphold a patent costs a company a minimum of $ 1. 5m ; that may oblige innocent firms to pay to settle and prevents infringed parties from seeking redress

    企業利法律武器維護一個專利權最起要花150萬美元;那樣只會鼓勵無辜的公司花錢了,並阻礙被侵權方尋求賠償。
  8. Currently, river - trade vessels use the 8 public cargo working areas, some privately run berths and terminals, 3 feeder berths at the container terminals, and the dedicated river trade terminal in tuen mun, which started operation in november 1998

    現時,內河貨船可使8個公眾貨物裝卸區、部分營泊位及頭、貨櫃頭的3個駁運泊位,以及於1998年11月啟的屯門內河貨運頭。
  9. Currently, river - trade vessels use the 8 public cargo working areas, some privately run berths and terminals, 3 feeder berths at the container terminals, and the dedicated river trade terminal ( rtt ) in tuen mun, which started operation in november 1998

    現時,內河貨船可使8個公眾貨物裝卸區、部分營泊位及頭、貨櫃頭的3個駁運泊位,以及於1998年11月啟的屯門內河貨運頭。
  10. A mask used to retrieve private manifest resources

    於檢索有清單資源的掩
  11. It also published a prescribed form for data access requests and a variety of guidance materials in relation to identity card numbers, consumer credit data and privacy protection on the internet

    此外,公署亦制備查閱個人資料所的指定表格,以及有關身分證號、消費者信貸資料和網際網路上隱保障等一系列指南。
  12. To protect privacy, aol used numbers instead of names to identify the uses, but people who saw the records quickly recognize that some users could be identified through the details of their searches

    為保護隱, aol使的識別號,而不是名字,但有人看紀錄很快認識到,一些戶可以通過搜查細節確定他們。
  13. The inner garden, a park in the hotel, offers greens, pavilions, and a bridge room services : telephone, international call, air conditioning, tv, room service

    另外在部分客房中,為住客特辟電子辦公室和國際網際網路絡服務,可擁有人的本地語音號和傳真號,亦可在房中直接使internet接入和瀏覽服務。
  14. The failure of the cardholder to observe or follow any recommendation of the bank from time to time regarding the safety and secrecy of the card and the pin or the failure to report the loss or theft of the card or loss, theft or disclosure of the pin to a third party to the bank as soon as reasonable practicable upon discovery thereof shall constitute gross negligence

    持卡人在保管此卡或該密方面未能遵守本銀行不時向持卡人建議之任何保管信卡及或人密措施,或未能在合理時間內及時通知本銀行有關信卡遺失或被竊事宜或人密被外泄予他人,可被視作為疏忽行為論。
  15. The failure of the cardholder to observe or follow any recommendation of the bank from time to time regarding the safety and secrecy of the card and the pin or the failure to report the loss or theft of the card or loss, theft or disclosure of the pin to a third party to the bank as soon as reasonable practicable upon discovery thereof shall constitute gross negligence. the issuance of a replacement card will be entirely at the discretion of the bank

    持卡人在保管此卡或該密方面未能遵守本銀行不時向持卡人建議之任何保管信卡及或人密措施,或未能在合理時間內及時通知本銀行有關信卡遺失或被竊事宜或人密被外泄予他人,可被視作為疏忽行為論。
  16. Can be used to verify that this block of data was really created by that private key

    才可以核實這組數據確實由該人密匙產生。
  17. You may use the archived private keys to decrypt the emails encrypted with your expired e - certs

    你可使存檔人密匙將舊有已過期電子證書加密的電子郵件解密。
  18. 6. presenting an authorization - based encryption algorithm, which using two encryption parameters, a public secret key and a private secret key, and converting user password into pc to save in database by exclusive - or logical operation

    ( 6 )提出了一種針對cms戶權限的加密演算法,該演算法具有公匙和匙兩個加密參數,通過異或等邏輯運算將戶口令加密成偽再進行存儲。
  19. A private accessor is a method that the test method uses to access the private code

    有訪問器是測試方法於訪問有代的方法。
  20. Private key cryptography

    密鑰密
分享友人