information integrity 中文意思是什麼

information integrity 解釋
信息完整性
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  • integrity : n. 1. 誠實,正直。2. 完全,完整。
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. Class cspart is a program interface provided for windchill system. windchill system can access and modify parts " parameters using this class, so the two systems can keep the integrity of data and realize information integration. two systems form b / w / d - c / s commix scheme

    Cspart類是編碼系統提供給windchill的應用程序介面,使windchill可以訪問和修改編碼系統某個零件的圖紙參數,保證了兩個系統相關零件屬性的一致,實現了信息集成。
  3. Xml data is an acknowledged typical semi - structured data with grammar and without semantic information. however sematic information is very important to preserve data integrity, data storage and query optimization

    Xml文檔是一種公認的有語法而無語義信息的半結構化數據,但語義對保護數據的完整性、數據存儲和查詢優化都有著十分重要的作用。
  4. Point out that the major causes of the problem are followings : the decline of social integrity ; the imperfection of law, accounting system, cpa auditing system and corporation governance in the fourth part, the author puts forward to some measurement and suggestion for administrating accounting information distortion

    第三部分:分析會計信息系統的各個環節,得出會計信息失真的原因,把整個原因分為:社會誠信水平下降、法律不健全、會計制度不完善、注冊會計師制度不合理及公司治理結構不完善。
  5. Followed by china ’ s deep revolution in finance, and fast - speed development of information skill, and economic international integrity, and that financial market opening after entering into wto, it is a serious challenge chinese banks will face. making feasible marketing schemes satisfied the customers is the important thing

    國內同業競爭日趨激烈、外資銀行大量湧入、客戶需求日益多樣化,導致銀行業競爭的日益加劇,這些都迫切要求銀行業改變經營觀念,以顧客需求為出發點,以顧客滿意為經營目標,制定出切實可行的營銷策略。
  6. On the basis of set operation on integrity bo - dy, taking advanta ge of the excellency provided abundant topolo - gical information by the ra dial edge data structure, applying the divide and conquer method for inha ncing the efficiency of the system, the boolean operation on integrity or unintegrity bodys is furnished

    本文在正則形體集合運算演算法的基礎上,充分應用輻射邊結構提供豐富拓撲信息的優點,運用了分而治之的編程思想,實現了形體間的正則、非正則布爾運算。
  7. Event class reports information when a message fails the message integrity check

    當某個消息未能通過消息完整性檢查時,
  8. The site administrator excerpt important things from network and then provides them in this website. the administrator will make every effort to ensure information integrity and accuracy. if some information violating some of your rights, please send me a email

    本站提供的信息由管理員根據網路資訊摘編而來,管理員會盡最大努力確保資料的完整性和準確性。
  9. This article mainly analyzes several factors, such as the complexity of information resources integrity, information islands, staggered system of organization and conservative management measures

    本文重點分析了信息資源整合本身的復雜性、 「信息孤島」現狀、 「條塊分割」的管理體制以及落後的管理方式等因素對政務信息資源整合的影響。
  10. Take integrity of object information into condition, a two - dimension signal processing method which can make a measurement of the target ’ s speed as well as the range is brought forward at the basis of waveform parameter design. and simulation in the background of hf multi - object with noise is taken. a comparison of signal properties, processing and antinoise detection performance is taken between mcpc and another two high range resolution radar signals : single carrier pulse coded signal and step frequency pulse coded signal

    考慮到目標信息提取的相對完整性,以高頻雷達為背景,在對多載波相位編碼脈沖串信號參數設計的基礎上,推導了三種多載頻相位編碼脈沖串信號的距離速度二維處理過程並相應的對多目標噪聲環境進行了模擬;將多載波相位編碼信號與另外兩種距離高分辨信號:單載頻相位編碼信號和相位編碼階梯跳頻信號,在信號特性、處理過程和抗噪聲特性方面進行了對比;本文從理論上為多載波相位編碼信號的波形設計和分析、信號的處理打下基礎。
  11. The ibm information management system is ibms premier transaction and hierarchical database management system, the product of choice for critical online operational applications and data where support for high availability, performance, capacity, integrity, and low cost are key factors

    Ims是ibm最早的事務和層次數據庫管理系統,它非常適合支持高可用性、高性能、高容量、高完整性和低成本的關鍵性聯機操作應用程序和數據。
  12. When inspecting or appraising its effect of evidence, we should consider the facts of generated, sent, received, stored data message and protecting the reliability of information integrity

    在考察或評估其證據力時,應考慮到生成、發送、接收及儲存該數據電文的辦法及保護其信息完整的辦法的可靠性等多項因素。
  13. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  14. Heterogeneous system information integrity by data warehouse method

    異構系統信息集成的數據倉庫方法
  15. All companies rely on some security mechanisms to ensure their corporate privacy and information integrity

    所有公司依靠一些安全機制,以確保他們的公司隱私和資料的完整性。
  16. Over the years, we have introduced measures to safeguard information integrity and security across and within government systems

    多年來,我們推行各種措施,務求確保政府系統所儲存和傳遞的資訊的完整性和安全性。
  17. It can provide many network applications with all kinds of security service, such as authentication, confidentiality, information integrity and non - repudiation of transaction

    它可以為各種網路應用提供身份認證、信息的機密性和完整性以及交易的不可否認性等安全服務。
  18. On the aspect of digital integrity verify, it introduces the michael algorithm, solving the problem that in wep mechanism, crc can not guarantee the verity of information integrity. in the end, making the secrecy transfers to documents become true

    在數據完整性校驗方面引入了michael演算法,對數據進行完整性校驗,解決了wep機制中crc不能保證信息完整性校驗的問題,最後實現了文件的保密傳輸。
  19. With the rapid development of information technology and its widespread application within the government, the objective is to develop an integrated government - wide information technology infrastructure with uniform design principles, standard models, common facilities and proper measures to safeguard information integrity and security

    隨資訊科技的急速發展及在政府內部普遍應用資訊科技,我們要發展一套綜合和適用於整個政府的資訊科技基礎設施,制定劃一的設計原則、標準模式、共通設施及保障資料完整穩妥的適當措施。
  20. The blp model lays emphasis on the control of the secrecy, and the information transaction from high security level to lower level is controlled. however, the blp model lacks the control of the information integrity, unable to master the operation of " write up " ", and there are potential problems in the " write up " operation

    Blp模型主要注重保密性控制,控制信息從高安全級傳向低安全級,而缺少完整性控制,不能控制「向上寫( writeup ) 」操作, 「向上寫」操作存在著潛在的問題。
分享友人