confidentiality of data 中文意思是什麼

confidentiality of data 解釋
數據可信靠度
  • confidentiality : 保密,不公開
  • of : OF =Old French 古法語。
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  1. The exchanges amongst the participants were conducted in a constructive and open manner and, as expected, discussions centred on obstacles such as data protection, confidentiality issues, bank secrecy and client privilege as well as the impact and opportunities created by developments in the field of information technology

    與會者交流的態度都是積極而開放的。一如預期,討論集中在各方合作上的障礙如保障私隱、保密事項、銀行機密及客戶權益,以至資訊科技發展的影響與所製造的機會等。
  2. Srtp uses efficient aes algorithm to guarantee confidentiality of rtp payload, and uses hmac - sha1 algorithm to provide data integrity as well as to prevent hostile replay hacking

    Srtp協議採用高效的aes演算法來保證rtp載荷的機密性,並使用hmac - sha1演算法提供數據的完整性保護,同時能夠防止惡意的重放攻擊。
  3. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控制、無連接的完整性、數據源鑒別、反重放攻擊、機密性和有限的通信量的機密性。
  4. The confidentiality of data brings up three further questions

    數據的機密性引出了三個更深入的問題:
  5. With ipsec, data need n ' t worry about being sniffed, altered or faked while transferring through internet. ipsec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers

    Ipsec在網路層發揮作用,對傳輸的ip包進行保護和認證,它提供了在internet這樣無保護的網路中傳送敏感信息的安全保證。
  6. Ethical justification for research involving this special group are as follow : specific irb should include someone who has appropriate background and experience to serve in that capacity ; the research might not equally well he carried out with subjects other than persons who are serving a sentence or receiving reeducation through labour ; definition of minimal risk shouldn ' t be compared with the risks normally encountered by this special group, but rather that of healthy persons ; free choice in informed consent should be ensured ; arrange treatment for research subjects after research terminated ; fairly distribute research burdens ; maintain confidentiality of research data and privacy ; reasonable payment need to be considered, etc

    涉及這一特殊群體臨床研究的倫理審查要求包括:倫理委員會的組成應該包括具有相應背景和經驗的服刑勞教人員代表;研究是針對服刑勞教人員所患的疾病,並且如果不選擇服刑勞教人員為受試者,研究不能同樣好地進行;最小風險應該參照「健康人群」進行判斷;知情同意應充分尊重其自主選擇權;試驗結束后治療安排;以及公平招募,保護隱私,合理補償等。
  7. 11 keep confidentiality of all process related data

    對工藝相關資料保密
  8. Ip security protocol ( ipsec ) provides identity authentication and high strength data encryption for traffic at the ip layer to protect the integrality and confidentiality of the packets. ipsec ensure the security of ip layer and upper layer protocol, such as tcp, udp and so on

    Ip安全( ipsec )協議使用強的密碼認證和加密演算法來保護ip通信的完整性和機密性,為ip及上層協議(如tcp和udp )提供安全保證。
  9. Authenticated streams can provide authentication, data signing, and encryption services that can help maintain the integrity and confidentiality of data transmitted using the

    經過身份驗證的流可以提供身份驗證、數據簽名和加密服務,這些服務有助於維護使用
  10. The grid application needs to handle any and all requirements for authentication, access control, data integrity, confidentiality of data, and public and private key management

    網格應用程序需要處理所有的認證、訪問控制、數據一致性、數據保密性、公鑰私鑰管理等方面的需求。
  11. Using standards - based ipsec technology, vpn client extends the integrity and confidentiality of data traveling outside of enterprise networks by providing encryption, compression, and authentication

    本軟體基於ipsec標準,通過加密,壓縮和認證來保護傳輸數據的完整性和機密性。
  12. We take the issue of confidentiality and data protection extremely seriously and the chosen outsourcer is contractually obliged to do likewise

    我們會嚴肅地對待這些信息並遵循數據保密準則。而且被我們選中的外包服務公司也將依據合同負有此義務。
  13. In order to ensure the security and confidentiality of personal data we collect, encryption techniques have been applied for data transmission

    為了確保個人資料的保安及保密,我們採用了加密法傳輸所收集的資料。
  14. Except in the event of breach of confidentiality, in no event shall either party be liable for any damages, including loss of data, lost profits, cost of cover or other special, incidental, consequential, direct or indirect damages arising from the use of the products, or provision of, or failure to provide, support, however caused and whether based on agreement, tort ( including negligence ) or any other theory of liability

    除非違反了保密規定,任何一方在任何情況下,對因使用產品、或提供或未提供支持,無論何種原因,亦無論基於協議、侵權(包括過失)或其他責任理論而引起的損害,包括數據丟失、利潤損失、服務費用或其他特殊的、附帶的、後果性的、直接的或間接的損害均不負賠償責任。
  15. We respect your privacy and we promise : to implement computer, physical and procedural safeguards to protect the security and confidentiality of the personal data we collect

    實行電腦、實地及程序上的保護措施,以保障本局所收集個人資料的保安及機密性
  16. Iii. personal data security measures : hirecruit will maintain confidentiality of all personal contact data entered on the website

    三您個人資料的保護措施: hirecruit對于您于網站上的個人連絡資料,我們會善盡保密之義務。
  17. All our employees who have access to, and are associated with the processing of personal data, are obliged to respect the confidentiality of official business matters, including personal data

    責成能存取個人數據以及與處理個人數據有關的所有雇員遵守官方公務的保密原則,包括對個人數據保密。
  18. The major barrier for the wider adoption of e - commerce is on the concerns about security and the protection of personal data when transactions are conducted over the internet. the presence of supporting infrastructures is extremely important to address the identities of the parties involved, the integrity and confidentiality of the information transmitted, and the non - repudiation and legal status of the electronic transactions

    因此,建立一套支援電子貿易的資訊基建設施,以確認參與交易人士的身分確保在交易過程中雙方交換的資料完整無缺及不會外泄保障在進行電子交易后交易雙方必須確認曾進行交易,以及給予電子交易法律地位,實在非常重要。
  19. The survey was conducted via the " conference line service " as to ensure the confidentiality of the information given by the respondents and that the data obtained were more reliable

    研究於九九年十一月進行,調查利用電腦數碼互動電話系統,做到資料完全保密,以確保所得數據是更可靠。
  20. These information properties include a company s financial data, human resource data, customer information, product sales data etc. because the confidentiality of information properties is getting more and more valuable, software development companies could use the complex designs of software protection lock to enable encode and decode data files, therefore software protection locks have an additional function

    這些信息資產包括公司的財務數據人事數據客戶數據銷售數據等。信息資產的保密性愈來愈受重視,而軟體開發公司可利用軟體保護鎖的復雜設計來達到將數據文件做編碼與譯碼的功能,所以軟體保護鎖便又多了一項可利用的價值。
分享友人