網上安全性 的英文怎麼說

中文拼音 [wǎngshàngānquánxìng]
網上安全性 英文
safe online
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 上名詞[語言學] (指上聲) falling-rising tone
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 網上 : on-line shopping
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的隱患的基礎,歸納出其六大要素,即系統的可靠、交易者身份的真實、數據電訊的機密和完整、數據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單體系的建立以及系統保護法規,第四章則介紹了電子提單的認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴
  2. The architecture of management system of user network business which is realized finally is simple, the structure is legible and the efficiency is high. it is very congruous to be used by such units as universities and enterprises, because of the characteristics of good portability, extendibility, maintainability, easy - to - use, security

    基於以關鍵技術,論文最終實現的「用戶路業務管理系統」 ,架構簡潔合理、結構清晰、能高效,具有較好的可移植、可擴展、可維護、易用等特點,非常適合應用於院校、企業等單位的園區
  3. In conclusion, it is primarily described that the expectable social and economical benefits of this mis are great, and the design can be fulfilled smoothly. the difficulty of this thesis is : not only think about the coordination each other synthetically on workers, equipments, technologies, data and user ' s priorities, different project and different continuation day, but also must ensure that it is agility, controllable and safe when the data be transmitted on internet or intranet

    本管理信息系統強調是針對無形的數據信息產品( gis等海量數據)的生產管理信息系統,不是單純的統計計算,還要實施嚴密的控制,除需要綜合考慮人員、設備、技能技術、權限、工程、工期在計劃調度統計方面的協調外,還需要強調海量數據信息產品的原始數據、半成品、成品在流動的靈活、可控制
  4. Immune evolutionary algorithms are optimal algorithms in essence, therefore, they can be used in some fields, such as cybernation, pattern recognition, optimal design, meshing learning, network security, etc. there are also some examples of these attempts described in this paper

    免疫進化計算在本質講是一種優化演算法,所以它們可以應用於一些諸如自動控制、故障診斷、模式分類、圖象識別、優化設計、機器學習和等廣泛領域,本文在這方面也做了一些初步的嘗試。
  5. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機路技術的迅猛發展和路技術在各行各業中的廣泛應用,人們通過計算機路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的路系統缺乏足夠的,不能有效防止所傳輸的信息被非法竊取和修改,因而極大地限制了計算機路技術在日常工作中的應用。當前,基於voip技術的各種路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  6. For maximum security, the server should only be placed on the extranet

    為獲得最高,該服務器應該只能放在外部
  7. A security enhancement scheme is proposed to encounter the black hole attacks in aodv protocol. this scheme may solve the black hole problem and prevent personating the destination node to some degree. 3

    針對移動adhoc路aodv協議中所存在的黑洞攻擊,提出了一種增強的解決方案,該方案能在一定程度解決黑洞問題並可防止假冒目的節點攻擊。
  8. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和路化製造系統的問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎,給出了一個路化製造系統的綜合訪問控制模型,包括路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的路化製造系統的訪問控制描述語言。
  9. The bank on construction bank net is landed to download individual safety certificate inside 7 days after been deal with, in order to ensure the net hands in easy security, this operation wants you to undertake construction bank website nods the bank on individual net to be able to let you input your card number only, remembering what here should input is you in ark of the bank when the bank on enlightened individual net member that account that gives you, input account and password, the system can hint you download individual safety certificate automatically, download please and appropriate is custodial certificate of good individual safety, if your individual certificate loses when your reshipment system, so the bank on your net with respect to invalidation, need to debut to the bank afresh

    辦理好了之後就在七日內登陸建行銀行下載個人證書,以確保交易的,這個操作只要你進行建行站點個人銀行就會讓你輸入你的卡號,記住這里要輸入的是你在開通個人銀行時銀行櫃員給你的那個帳號,輸入帳號和密碼,系統會自動提示你下載個人證書,請下載並妥善保管好個人證書,假如你的個人證書在你重裝系統時遺失的話,那麼你的銀行就失效了,需重新到銀行開通。
  10. The construction bank card that you want to take you and id arrive open an account to fill in all right a piece of registration form that applies for to open the bank on the net, the bank on construction bank net is landed to download individual safety certificate inside 7 days after been deal with, in order to ensure the net hands in easy security, the system can hint you download individual safety certificate automatically, download please and appropriate is custodial certificate of good individual safety, if your individual certificate loses when your reshipment system, so the bank on your net with respect to invalidation, need to debut to the bank afresh

    你要帶你的建行卡及身份證到開戶行填寫一張申請開通銀行的登記表,辦理好了之後就在七日內登陸建行銀行下載個人證書,以確保交易的,系統會自動提示你下載個人證書,請下載並妥善保管好個人證書,假如你的個人證書在你重裝系統時遺失的話,那麼你的銀行就失效了,需重新到銀行開通。
  11. The architecture of client / server based on transaction middleware is a typical kind of the distributed on - line transaction processing, becoming a major platform of enterprise information system, which offers communication of striding platform, loading balance, fault - tolerant and resumable ability, and strengthens a new generation middleware in common with 3 - layer architecture provided with the strong security, excellent management and high availability in common. numerous distributed system, different database and different network environment are closely linked up among an enterprise, offering the function of mutual operation on application layer

    基於交易中間件的c s結構是一種典型的分散式事務處理系統,成為構築企業信息系統的主流平臺,它提供了強大的跨平臺通訊、負載平衡、容錯及其故障恢復能力,並在這個基礎進一步強化了、可管理和高可用的新一代通用型三層結構平臺的中間件,把企業中眾多的異構系統、異構數據庫、不同路環境緊密的聯系起來,並在應用層提供了互操作的功能。
  12. In e - business, security electronic payment always plays an important role in the electronic transaction. at the end, we analyze the related online payment technology, implement an online payment prototype component system based on the java cryptography architecture and discuss the online payment component technology briefly

    論文的最後還分析了支付系統的相關技術,並對現有的支付系統的進行折衷,基於jdk的加密體系實現了一個支付原型組件系統,對支付組件技術做了初步探討。
  13. Upon the implementation of tx - defendingl. o, the author puts forward an idea of expressing network security policy in a formal logic language. the language discussed here is role - based standard deontic logic. this language can not only detect policy consistency, but also resolve policy conflicts

    最後,本文對用於主動防火墻各成員之間交互信息的策略進行了討論,在理論提出了一種可以自動檢測策略一致以及自動解決策略沖突的策略語言一基於角色的sdl 。
  14. The better firewall products let you drag and drop groups in a graphical user interface ( gui ) environment to easily define network security

    更好的防火墻產品可以讓你在一種圖形用戶介面( gui )環境中用鼠標器在屏幕操作進行分組,以便簡便地定義
  15. Then referring to the distribution projects of ip address in existing gprs network, the author analyzed and compared relative merits of deferent projects and brought up a new project : because both chinese gprs network and exterior data network are actually the same physical network, considering the gprs network security which is ensured by invisibility relative to exterior network, gprs network facilities try their best to employ private address in order to detach logically gprs core - net from exterior network through packet filtration of firewall and router ; because of the deficiency of public ip address recourses, the employment of public ip address should be minimized

    隨后參照現有gprs路ip地址的分配方案,通過分析、比較各種方案的優缺點,提出了一個新的分配方案:由於中國gprs路和外部數據合二為一的現實,出於對的考慮,路設備盡量採用私有地址,通過防火墻和路由器進行包過濾,使gprs核心在邏輯與外部路分開,使其對外部路不可見以保證gprs的;同時,由於公有ip地址資源不足,盡可能地減少用戶對公有ip地址的佔用。
  16. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾幾下」的特點,並結合未來「運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據;在基於b s架構的系統整體方案基礎,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹、 adsl為接入端的基於公用數據路分組交換技術的系統路體系結構,並針對路自身和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的能。
  17. Based on comprehensive information security policy of security system, this paper studies the security of local area network by network security technology and network security management

    摘要基於系統的面信息策略,從技術和管理這兩個層次研究內部
  18. In this linkage frame foundation, the system has realized the intrusion detection, and the honeypot joint operation and the intelligent linkage response technology, effectively enhance the system network security performance

    在此聯動框架的基礎,系統實現了入侵檢測和蜜罐的協同工作和智能的聯動響應技術,有效的提高了系統的能。
  19. Because a lot of manage and applications are used in campus network, the security of campus network becomes more and more important. the security of campus network is discussed in the paper, a really plan of how to resolve the security problems in educational management information system of the center of taizhou career education is designed

    當前校園各種管理及應用的不斷興起,校園問題變得越來越重要。本文就以泰州職校管理信息系統解決方案的實例,針對校園給予探討。
  20. In the trial measurement, the device shows good performance. simulant trial and actual result indicate that method in the paper acquire approving effect. the successful develop of device can improve reliability of distribution, can bring some operating experience for realtime and automatic recording overvoltage in higher voltage level power system

    通過現場實際採集的數據說明,該裝置可以應用於工程實踐中。本裝置的研製成功對提高配電具有重要的科學意義和良好的應用前景,並能對以後10kv以電壓等級的過電壓實時記錄裝置的研究取得一些經驗。
分享友人