網上安全性 的英文怎麼說
中文拼音 [wǎngshàngānquánxìng]
網上安全性
英文
safe online- 網 : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
- 上 : 上名詞[語言學] (指上聲) falling-rising tone
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 網上 : on-line shopping
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。The architecture of management system of user network business which is realized finally is simple, the structure is legible and the efficiency is high. it is very congruous to be used by such units as universities and enterprises, because of the characteristics of good portability, extendibility, maintainability, easy - to - use, security
基於以上關鍵技術,論文最終實現的「用戶網路業務管理系統」 ,架構簡潔合理、結構清晰、性能高效,具有較好的可移植性、可擴展性、可維護性、易用性、安全性等特點,非常適合應用於院校、企業等單位的園區網。In conclusion, it is primarily described that the expectable social and economical benefits of this mis are great, and the design can be fulfilled smoothly. the difficulty of this thesis is : not only think about the coordination each other synthetically on workers, equipments, technologies, data and user ' s priorities, different project and different continuation day, but also must ensure that it is agility, controllable and safe when the data be transmitted on internet or intranet
本管理信息系統強調是針對無形的數據信息產品( gis等海量數據)的生產管理信息系統,不是單純的統計計算,還要實施嚴密的控制,除需要綜合考慮人員、設備、技能技術、權限、工程、工期在計劃調度統計方面的協調性外,還需要強調海量數據信息產品的原始數據、半成品、成品在網路上流動的靈活性、可控制性和安全性。Immune evolutionary algorithms are optimal algorithms in essence, therefore, they can be used in some fields, such as cybernation, pattern recognition, optimal design, meshing learning, network security, etc. there are also some examples of these attempts described in this paper
免疫進化計算在本質上講是一種優化演算法,所以它們可以應用於一些諸如自動控制、故障診斷、模式分類、圖象識別、優化設計、機器學習和網路安全性等廣泛領域,本文在這方面也做了一些初步的嘗試。With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data
隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施For maximum security, the server should only be placed on the extranet
為獲得最高安全性,該服務器應該只能放在外部網上。A security enhancement scheme is proposed to encounter the black hole attacks in aodv protocol. this scheme may solve the black hole problem and prevent personating the destination node to some degree. 3
針對移動adhoc網路aodv協議中所存在的黑洞攻擊,提出了一種增強安全性的解決方案,該方案能在一定程度上解決黑洞問題並可防止假冒目的節點攻擊。We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac
本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。The bank on construction bank net is landed to download individual safety certificate inside 7 days after been deal with, in order to ensure the net hands in easy security, this operation wants you to undertake construction bank website nods the bank on individual net to be able to let you input your card number only, remembering what here should input is you in ark of the bank when the bank on enlightened individual net member that account that gives you, input account and password, the system can hint you download individual safety certificate automatically, download please and appropriate is custodial certificate of good individual safety, if your individual certificate loses when your reshipment system, so the bank on your net with respect to invalidation, need to debut to the bank afresh
辦理好了之後就在七日內登陸建行網上銀行下載個人安全證書,以確保網上交易的安全性,這個操作只要你進行建行網站點個人網上銀行就會讓你輸入你的卡號,記住這里要輸入的是你在開通個人網上銀行時銀行櫃員給你的那個帳號,輸入帳號和密碼,系統會自動提示你下載個人安全證書,請下載並妥善保管好個人安全證書,假如你的個人證書在你重裝系統時遺失的話,那麼你的網上銀行就失效了,需重新到銀行開通。The construction bank card that you want to take you and id arrive open an account to fill in all right a piece of registration form that applies for to open the bank on the net, the bank on construction bank net is landed to download individual safety certificate inside 7 days after been deal with, in order to ensure the net hands in easy security, the system can hint you download individual safety certificate automatically, download please and appropriate is custodial certificate of good individual safety, if your individual certificate loses when your reshipment system, so the bank on your net with respect to invalidation, need to debut to the bank afresh
你要帶上你的建行卡及身份證到開戶行填寫一張申請開通網上銀行的登記表,辦理好了之後就在七日內登陸建行網上銀行下載個人安全證書,以確保網上交易的安全性,系統會自動提示你下載個人安全證書,請下載並妥善保管好個人安全證書,假如你的個人證書在你重裝系統時遺失的話,那麼你的網上銀行就失效了,需重新到銀行開通。The architecture of client / server based on transaction middleware is a typical kind of the distributed on - line transaction processing, becoming a major platform of enterprise information system, which offers communication of striding platform, loading balance, fault - tolerant and resumable ability, and strengthens a new generation middleware in common with 3 - layer architecture provided with the strong security, excellent management and high availability in common. numerous distributed system, different database and different network environment are closely linked up among an enterprise, offering the function of mutual operation on application layer
基於交易中間件的c s結構是一種典型的分散式事務處理系統,成為構築企業信息系統的主流平臺,它提供了強大的跨平臺通訊、負載平衡、容錯及其故障恢復能力,並在這個基礎上進一步強化了安全性、可管理性和高可用性的新一代通用型三層結構平臺的中間件,把企業中眾多的異構系統、異構數據庫、不同網路環境緊密的聯系起來,並在應用層提供了互操作性的功能。In e - business, security electronic payment always plays an important role in the electronic transaction. at the end, we analyze the related online payment technology, implement an online payment prototype component system based on the java cryptography architecture and discuss the online payment component technology briefly
論文的最後還分析了網上支付系統的相關技術,並對現有的網上支付系統的安全性進行折衷,基於jdk的加密體系實現了一個網上支付原型組件系統,對網上支付組件技術做了初步探討。Upon the implementation of tx - defendingl. o, the author puts forward an idea of expressing network security policy in a formal logic language. the language discussed here is role - based standard deontic logic. this language can not only detect policy consistency, but also resolve policy conflicts
最後,本文對用於主動防火墻各安全成員之間交互信息的安全策略進行了討論,在理論上提出了一種可以自動檢測策略一致性以及自動解決策略沖突的網路安全策略語言一基於角色的sdl 。The better firewall products let you drag and drop groups in a graphical user interface ( gui ) environment to easily define network security
更好的防火墻產品可以讓你在一種圖形用戶介面( gui )環境中用鼠標器在屏幕上操作進行分組,以便簡便地定義網路安全性。Then referring to the distribution projects of ip address in existing gprs network, the author analyzed and compared relative merits of deferent projects and brought up a new project : because both chinese gprs network and exterior data network are actually the same physical network, considering the gprs network security which is ensured by invisibility relative to exterior network, gprs network facilities try their best to employ private address in order to detach logically gprs core - net from exterior network through packet filtration of firewall and router ; because of the deficiency of public ip address recourses, the employment of public ip address should be minimized
隨后參照現有gprs網路ip地址的分配方案,通過分析、比較各種方案的優缺點,提出了一個新的分配方案:由於中國gprs網路和外部數據網合二為一的現實,出於對安全性的考慮,網路設備盡量採用私有地址,通過防火墻和路由器進行包過濾,使gprs核心網在邏輯上與外部網路分開,使其對外部網路不可見以保證gprs的網路安全性;同時,由於公有ip地址資源不足,盡可能地減少用戶對公有ip地址的佔用。The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety
論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。Based on comprehensive information security policy of security system, this paper studies the security of local area network by network security technology and network security management
摘要基於安全系統的全面信息安全策略,從網路安全技術和網路安全管理這兩個層次上研究內部網的安全性。In this linkage frame foundation, the system has realized the intrusion detection, and the honeypot joint operation and the intelligent linkage response technology, effectively enhance the system network security performance
在此聯動框架的基礎上,系統實現了入侵檢測和蜜罐的協同工作和智能的聯動響應技術,有效的提高了系統的網路安全性能。Because a lot of manage and applications are used in campus network, the security of campus network becomes more and more important. the security of campus network is discussed in the paper, a really plan of how to resolve the security problems in educational management information system of the center of taizhou career education is designed
當前校園網上各種管理及應用的不斷興起,校園網的安全問題變得越來越重要。本文就以泰州職校管理信息系統安全性解決方案的實例,針對校園網的安全性給予探討。In the trial measurement, the device shows good performance. simulant trial and actual result indicate that method in the paper acquire approving effect. the successful develop of device can improve reliability of distribution, can bring some operating experience for realtime and automatic recording overvoltage in higher voltage level power system
通過現場實際採集的數據說明,該裝置可以應用於工程實踐中。本裝置的研製成功對提高配電網的安全性具有重要的科學意義和良好的應用前景,並能對以後10kv以上電壓等級的過電壓實時記錄裝置的研究取得一些經驗。分享友人