通信流安全 的英文怎麼說

中文拼音 [tōngxìnliúānquán]
通信流安全 英文
traffic flow security
  • : 通量詞(用於動作)
  • : Ⅰ動1 (液體移動; 流動) flow 2 (移動不定) drift; move; wander 3 (流傳; 傳播) spread 4 (向壞...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • 通信 : communication; communicate by letter; correspond
  1. At last this module is synthesized using 6s06dpdm technology library. 3, the algorithm used in key module to the performance of data security is thoroughly analyzed. considering both performance of enciphering and degree of complexity of realization, steam cipher algorithm is used

    3 、對數據性起決定作用的加密模塊所採用的加密演算法進行了深入的分析,綜合加密性能和實現的復雜度的考慮,採用了密碼的加密演算法。
  2. The architecture of client / server based on transaction middleware is a typical kind of the distributed on - line transaction processing, becoming a major platform of enterprise information system, which offers communication of striding platform, loading balance, fault - tolerant and resumable ability, and strengthens a new generation middleware in common with 3 - layer architecture provided with the strong security, excellent management and high availability in common. numerous distributed system, different database and different network environment are closely linked up among an enterprise, offering the function of mutual operation on application layer

    基於交易中間件的c s結構是一種典型的分散式事務處理系統,成為構築企業息系統的主平臺,它提供了強大的跨平臺訊、負載平衡、容錯及其故障恢復能力,並在這個基礎上進一步強化了性、可管理性和高可用性的新一代用型三層結構平臺的中間件,把企業中眾多的異構系統、異構數據庫、不同網路環境緊密的聯系起來,並在應用層提供了互操作性的功能。
  3. Although these methods have their advantages respectively, there are some disadvantages in tracing efficiency, network flux control, communication security and subagent callback for these meth ods more or less

    這些方法各有所長,但本身在追蹤效率,網路量控制、性和子agent的回收等方面都或多或少存在一些不足。
  4. At present the company is the general agent of japan conice closed - circuit monitoring system and network digital building system of china, hong kong, macao ; it also the appointed agent in china of germany bosch visual buildings system and anti - fire / anti - burglar alarm system, south korean lg professional circuit monitoring products, taiwan aone video security products, japan elbex professional circuit monitoring system

    本公司憑借「以誠待客、以為本、開拓創新、科學管理」為經營理念,以提供「高效、優質的產品,一、完善的服務」為經營方針,務求過我們的優勢為您提供可靠、有心保障的防產品,與您共創輝煌的明天。
  5. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機息系統體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種行的體系模型基礎上,提出了用於指導計算機息系統體系建設的動態縱深防禦體系模型; 2 )在對各種體系標準進行研究與分析的基礎上,引入了域和防護層次的概念,提出了息類別、威脅級別和保障級別的定義,闡述了進行計算機息系統分析的方法和要求; 3 )在體系模型和分析的基礎上,提出了管理及技術的分級要求,從而便於進行計算機息系統的設計以及產品的選型; 4 )設計並基本實現了用於保障上述體系動態協同能力的協同平臺。
  6. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外系統在網路環境下的問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權息嵌入到多媒體數據中,以起到版權保護、秘密、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的行演算法魯棒
  7. These activities include efforts to strengthen export controls, international nuclear safeguards, physical protection of nuclear materials and facilities, nuclear emergency management, and radioactive source security by setting up information exchanges and training programs

    這些努力包括:過建立息交和培訓項目加強出口控制、國際核保障、核材料及設施實地保護、核危機處理以及對放射源的保護。
  8. Today, liquid crystal, a new functional material, has been applied more and more widely. on the side of display, owing to stable frarne, absolute environmental protecting, save electric energy and no tire for user, liquid crystal display keeps ahead among the range of display. with the developing of the technology of liquid crystsl, lcd will must substitute for crt and become the chief in market. in additin, liquid crystsl light filers which have been used in optic communicatins and light information handling, emply th e technical of combining the birefringence of liquid crystsl and fabry - petrot - type cavity. they manifest a series of merit, such as narrow band wide, deterioration low, wide tuning domain, simple structure and low cost, so liquid crystal light filter draw attention of many country

    現在,液晶作為一種新型功能材料越來越得到廣泛的應用,在電子顯示裝置中,液晶顯示器以其畫面平穩、真正環保、省電和使用者不易疲勞等優點領先於顯示器的行列中。隨著液晶技術的發展,液晶顯示器將取代crt顯示器逐步成為未來市場的主。此外,應用於光和光息處理中的電調諧液晶濾光片,採用液晶材料的雙折射和電光效應與傳統f - p腔相結合,表現出窄帶寬、低損耗、調諧范圍寬、驅動電壓低、結構簡單、低成本等一系列優點,而日益受到各國研究部門的關注。
  9. It ' s well known that the project documentations " storage and management have an very important effect on the development of all kinds of project, and as the information age is coming, network technology has been applied to this procedure gradually. this article mainly introduces the study and realization of a internet - based project documentation storage and management system which application programming frame is built with delphi6. 0 and sql server2000. based on the tcp / ip protocol, the system try to establish a c / s model with connection - oriented, dependable stream sockets and multithread technology to complete some especial data communications by networks, such as the files of project, directory of user, all self - defined commands or messages and their parameters, and so on

    本文所研究的《基於internet的項目文檔存儲管理系統》過delphi6 . 0和visualc + + 6 . 0相結合的開發平臺,結合sqlserver2000 ,將client server模式的數據庫技術和windowssocket網路技術進行集成,遵循tcp ip協議,同樣採用c s結構運行於internet ,過服務器將處于各個不同物理位置的客戶機連接起來,形成一個交平臺;其中,引入了目前國際上行的先進的管理控制方法? ?角色控制理論對用戶進行權限分配,使擁有相應角色的人具有相應權限;然後系統自動根據組織部門或用戶的設立在服務器端生成相應的網路「虛擬文件櫃」 ,使擁有相應權限的人可以對相應文件櫃中的文檔進行整理;再過多線程技術和windows套接字機制在tcp ip協議上實現了單個文件及目錄的傳輸。
  10. A good thought for applying telecommunication system, based on the intelligent optical networks and service networks, combining with the technology of computer ’ s software, can realize many functions such as data sharing, application integrating, service flow controlling, etc. city emergent relation systems ( cerss ) are the systems that integrating many kinds of resources of services, using uniform phone number for receiving calls, handling emergent events or help in one combined action, offering succor for citizen and strongly ensuring public safety of the city

    將智能光網路及智能網與計算機軟體有關技術相結合的系統,實現了數據共享、應用集成、業務程式控制制等功能,為系統應用提供了很好的解決思路。城市應急聯動系統是綜合各種城市應急服務資源,採用統一的號碼,用於公眾報告緊急事件和緊急求助,統一接警,統一指揮,聯合行動,為市民提供相應的緊急救援服務,為城市的公共提供強有力的保障的系統。
  11. The second part tracks the technology of information security and electronic security protocol which is advanced nowadays and will be applied in later sectors. the third part analyses secure demands of e - business and design general system frame of secure electronic business. the forth part analyses data flow and transaction process in the systems of electronic payment based on set protocol and ssl protocol distinctly, then designs them. systems of electronic payment consist of four logic parts, including client side, payment server, payment gateway, which is designed in fifth part

    本文從應用的角度出發,過跟蹤研究國內外先進的技術和電子交易協議,對支付型電子商務業務及其需求作了詳細的分析;分別設計了基於set協議和non ? set協議的電子支付交易程及系統中各組成部分(包括客戶端軟體、支付服務器、支付網關)的基本功能模塊,能較好實現商家、顧客、企業、銀行之間的、資金的傳遞及保障;接著就電子支付系統實現過程中的息交換和系統集成等方面的問題作了探討,並給出了基於j2ee和xml的解決原型。
  12. Based on the analysis of commercial banks " current concept about fund management, this paper brings forward that fund management is the main - string in its operation, and that the concept of fund management, including security and profitability, is extended from current " forrying fund " to the management of the fund cost and fund risk the paper comprehensively discusses the principle of fund management, the management of fund costs, the tactics of management about fund liquidity, the measures of management about fund risks and how to solve the problems on interest risk in the period of frequent interest fluctuation. the paper puts forward ideas on how to improve the fund management. the security, liquidity and profitability of the fund, which are both contradictory and integrated with one another, are internal factors of fund management. fund liquidity is traditional core question. commercial banks face with a number of risks of witch credit risk is the greatest one because our country has adjusted interest rates 8 times since 1996, which covered a period of frequent interest fluctuation

    商業銀行面對許多風險,但最大風險是用風險。由於我國自1996年以來已連續調整了8次利率,近幾年是利率波動頻繁時期,研究利率的敏感性問題顯得特別重要。要改善資金管理,提高商業銀行的經營水平,就要建立資金管理是商業銀行經營主線的理念,對資金要統一規劃和管理;要改革銀行的體制,建立現代企業制度和法人治理結構,在體制上為資金管理提供有利的運行平臺;增加改善資金動性管理所需的貨幣政策工具,擴大資金調控手段;打破貨幣市場的僵化局面,為資金管理創造有利的宏觀環境;續續優化負債結構和負債載體設計;增強資金用風險規避和化解的措施;過銀行資源整合,努力尋找資金的投放渠道,最終完成經營模式由傳統型向現代型的轉變。
  13. The framework outlined four major goals : inform clinical practice with use of ehrs, interconnect clinicians so that they can exchange health information using advanced and secure electronic communication, personalize care with consumer - based health records and better information for consumers, and improve public health through advanced biosurveillance methods and streamlined collection of data for quality measurement and research

    它勾畫了四項主要目標:使用ehr來使臨床實踐息化,使用先進的電子訊來互聯起醫生使他們能交醫療息,使用基於病人的病歷和適合病人的更好息化來將醫療服務個性化,過先進的生物監控方法和暢精確的數據收集做高質量的測量和研究來改善公共健康。
  14. It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication

    過ah和esp協議來以下的服務:訪問控制,無連接完整性,數據源認證,重放攻擊保護,機密性和有限的保密性。
  15. This thesis demonstrated in detail the bank organization, operation procedures, security requirement analysis, etc. it also lucubrated the information security theory, and analyzed the information security structural levels. based on the above results, a security design scheme was developed from a technically and operationally integrated consideration for e - banking system in beijing agriculture bank. technique factors consisted of security controls of website, including the firewall strategies, break - in testing and system scanning, ca digital certification system and security controls

    在研究了的相關理論的基礎上,提出了北京農行網上銀行系統的技術和業務上綜合考慮的設計方案,前者包括針對網站的控制,如包括防火墻策略、入侵檢測和系統掃描、 ca數字證書體系、控制等,後者以個人業務、對公業務、銀券業務等程說明業務的實現。
  16. Ipsec offers security services including connectionless integrity, data origin authentication, protection against replays, confidentiality and limited traffic flow confidentiality for ip and upper layer protocols

    Ipsec為ip及上層協議提供了無連接完整性、數據源身份認證、抗重播攻擊、數據內容的機密性和有限的量機密性等服務。
  17. Covert channel is the key problem of the research of information flow security, so domestic and overseas scholars research the problem of information security through analyzing covert channel

    道是性研究的關鍵問題,國內外學者過分析隱道對問題進行了研究。
  18. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路中的分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
  19. The model for re - use pci address / data bus and the chip for pci bus security have been verified by asic

    本文研究的pci介面ad總線再復用模型、 pci介面晶元過了asic ( applicationspecificintegratedcircuit )片驗證。
  20. Moreover, with the circulation of large information resources, a variety of baleful codes and illegal data are mixed in it as well, thus security problems fall upon us. how to keep a tab on and filter out these harmful data gradually becomes a pressing issue

    並且,隨著大量息資源在網路上的,各種惡意程式和非法數據也混雜其中,它們對計算機的危害是顯而易見的,從而問題也隨之而來,如何在計算機中監控以及過濾這些有害數據逐漸成為一個緊迫的問題。
分享友人