logical security 中文意思是什麼

logical security 解釋
邏輯安全性
  • logical : adj. 1. 邏輯的,邏輯上的;邏輯學上的。2. 合乎邏輯的。3. 邏輯上必然的。adv. -ly ,-ness n.
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. When listening to mechanism of inferior public security to represent a report, should to it look communication, show the posture movement that oneself listen attentively to seriously in order to nod first class what match, the person that can ask in time to report to the very not clear problem in the report repeats, explanation, also can quiz appropriately, but the problem that should notice to carry is logical, unapt the train of thought that interrupts report of the other side

    聽取下級公安機關代表匯報時,應與之目光交流,配之以點頭等表示自己認真傾聽的體態動作,對匯報中不甚清楚的問題可及時要求匯報者重復、解釋,也可以適當提問,但要注重所提的問題合乎邏輯,不至於打斷對方匯報的思路。
  2. Finally, we carried out the theoretically logical proof of the security of the revised protocol, using the formal logic analysis method

    最後,作者運用形式邏輯分析的方法對修改後協議的安全性進行了理論上的邏輯證明。
  3. In some projects charged by our lab such as national 863 project - " crop planting management components based on weather analyse ", anhui provincial 95 key project - " agricultural meteorology disaster evaluation system base on gis in anhui province " and the project " small coal mine security management and decision system based on gis in anhui province ", this paper combines the theory and arithmetic of rough set with gis and data mining in idss, investiges the application of rough set theory to precision analysis of attribute data and logical operation in gis, analyzes the logical operation based on rough set ( logical union, logical intersection, logical complement, mixed logical operation etc. ), so that it can give a method y to research the gis attribute data and the uncertainty of attribute data after superposition operator, so as to express the roughness and illegibility of attribute data more accurately

    在完成試驗室所承擔的國家863項目「基於氣象分析的農作物種植管理軟構件」 、省95攻關項目「基於gis的安徽省重大農業氣象災害測評系統」和「基於gis的安徽省小煤礦安全管理決策系統」等項目中,將粗糙集理論和演算法與gis 、智能決策系統中的知識發現等相結合,對粗糙集理論在gis屬性數據和邏輯運算精度分析中的應用情況進行了研究,分析了基於粗集的gis邏輯運算(邏輯並、邏輯交、邏輯補、混合邏輯等) ,從而為研究gis屬性數據及其疊加運算后屬性數據的不確定性提供了一種方法,能比較準確地表達屬性數據的模糊性和粗糙性。
  4. The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal

    混沌系統和rijndael演算法的固有特點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實現,是一種有效的單向hash函數; 3 )研究了一種無需同步的基於混沌調制的數字語音保密通信系統的方案,利用邏輯映射產生混沌調制序列,以該序列作為密碼對數字語音進行加密處理,為了更好的隱匿信號特徵,混沌調制在小波分解的基礎上,對不同的通道使用不同的參數進行,並借鑒混沌掩蓋對信息信號進行了限幅處理,使密文完全隨機化。
  5. In the managed environment, application domains which you can think of as logical processes and contexts provide isolation and security at less cost and with greater ability to scale well than an operating - system process by relying on, among other things, the fact that managed code is verifiably type - safe

    在託管環境中,應用程序域(可以視為邏輯進程)和上下文以比操作系統進程更低的成本提供隔離和安全性,並具有更強的伸縮能力,這依賴于託管代碼的許多優點,特別是託管代碼被證明是類型安全的。
  6. By employing a method of combining narration with argumentation, logical inference with comparative analysis and qualitative analysis with quantitative analysis, by taking the standpoint of historical materialism and based on interdisciplinary application of such economic principles as comparative cost theory and international relation theories, the present paper intends to make a breakthrough in the traditional theoretical framework of oil security and probe into the issue of oil in the middle east and china ' s oil security in some way

    本文採用敘述與議論相結合,邏輯推理與比較分析並舉,定性分析與定量界定相結合的方法。堅持歷史唯物主義的基本立場,以比較成本理論等經濟學原理與國際關系理論的交叉運用為理論基礎,力求突破傳統石油安全理論的框架,對中東石油與中國的石油安全戰略進行一定程度的探討。
  7. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  8. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵網路,網路安全問題成為人們關注的焦點,傳統安全方法是採用盡可能多的禁止策略來進行防禦。目前採用的手段有防火墻、加密、身份認證、訪問控制、安全操作系統等,這些對系統非法入侵都起到一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  9. Physical and logical isolation make up the foundation of sql server security

    物理和邏輯隔離是構成sql server安全的基礎。
  10. This paper stresses on discussing the architecture, access protocol and implementation mechanism based on xml and web services technologies, researches key technologies of metadata information service and data uniform access and management in database grid, designs and implements distributed mis subsystem and das subsystem, which support multi - domain management. mis can provides metadata information for the whole system, such as das and clients, it uses domain name 、 logical name and internal name of data object to uniformly name database resources in grid and implements name mapping mechanism and user view metadata information service and provides virtual organization and management of database resources. das can provide a scalable uniform data access by virtual organization and management of storage resources and multi - mode data share access mechanism, thus integrate database resources in grid and shields distribution and heterogeneity of resources and achieves transparent access. system adopts data access mechanism based on user request mapping to flexibly implement data access across multi domains, and adopts distributed data cache mechanism 、 security mechanism based gsi to provide high - performance secure data service for grid users

    本文論述了griddaen - dai系統的邏輯結構、訪問協議、數據服務流程以及基於webservices 、 xml等技術的實現策略,重點研究數據庫網格中的元服務、數據統一訪問和管理等關鍵技術,設計和實現了支持多管理域的分散式元服務子系統和數據訪問服務子系統。其中元服務主要為整個系統提供各種元信息支持,它採用域名、數據對象的邏輯名稱、物理名稱和內部名稱對廣域環境下的數據庫數據進行了統一命名,實現了相應的名字映射機制和全局的用戶數據視圖服務,提供了數據庫資源的虛擬組織與管理方式;數據訪問服務通過提供可擴展的統一數據訪問和支持多種數據共享訪問模式,屏蔽了數據庫資源的分佈性和異構性,為用戶提供了統一透明的數據服務。
  11. 2003, 6 : 43 - 70. 28 anupam datta, ante derek, john c mitchell, dusko pavlovic. a derivation system for security protocols and its logical formalization

    而且,我們對協議的運行環境進行了不同的假設,提出了各種信息交換系統模型message - passing system
  12. So we can know, though the protecting system of trust of the two law systems have the different creation source and totally different development track, but they have the same logical organization, the same important constructive conditions and the same legal consequence, both are different roads lead to the same goals to protect transaction security

    大陸法系和英美法的信賴保護制度雖有著不同的產生根源及完全不同的發展軌跡,但有著相同的邏輯結構,相同的事實要件和法律後果,目的都是保護交易安全。兩大法系有統一信賴保護制度的趨勢,以創設中間性的信賴保護一般條款來完善此制度。
  13. So, from the angle of institutions, this paper analyzes the performance of china security market. to strengthen the persuasion of conclusion, this paper bands theoretical means and empirical means together, with the logical order as following, " elementary empirical study - " problem - theoretical analysis - farther empirical study - theoretical sublimation - conclusi on and suggestions ". the paper also outlines the picture of framework of institutions as well as performance of china security market

    本文站在發展戰略的高度,從制度和制度變遷的視角全面、深入地考察了我國證券市場的績效問題;為增強理論分析的說服力,文章採取了理論和實證相結合的原則,遵循「初步實證提出問題理論分析進一步實證理論升華對策建議」的邏輯思路,勾畫出了證券市場制度結構和績效結構全景圖。
  14. Part four : this part fully uses the study methods of the combination of history analysis and logical analysis, of the experience of other countries and the basic realities of china, of the theory and practice. about the basic objective pattern of the old - age insurance system, maintaining and increasing the value of the funds for old - age insurance, and the intangible debts in the shift of mechanisms of social security, i give my own advice

    第四部分:運用歷史分析與邏輯分析相結合、借鑒國外經驗與本國具體情況相結合、理論研究與實際問題相結合的方法,對企業職工養老保險基本目標模式、養老基金保值增值、解決轉型期「隱性債務」等問題提出了自己的見解。
  15. The thesis discusses the application of windows dna in video monitor system and introduces how to design the three - tier architecture of the data service layer, business logical layer and presentation layer, and emphatically introduces security setting between these layers

    本論文中探討了windowsdna在視頻監控系統中的應用,包括如何設計三層結構中的數據服務層、商務邏輯層和展示層,並著重介紹了各層之間的安全性設置。
  16. Through the study of domestic and international relevant theory, it combines the current situation of the security market of our country, regards the moral risk, liquidity risk, market risk of the open - ended fund as the focal point and carries on overall, systematic, deep studying to the relevant problems with the method of combing the logical theory and practices, qualitative analysis combing the quantitative analysis

    通過對國內外相關理論的研究,並結合我國證券市場的發展現狀,以開放式基金的道德風險、流動性風險、市場風險為研究重點,對相關問題進行全面、系統深入地研究。本文認為: 1 .要防範開放式基金道德風險,就必須強化股東大會、改善基金託管人制度,這才能改變以往的股東大會虛置,從根本上解決基金信息不對稱所引起的風險。
  17. The framework covers the logical security aspect of a web application and protects static data on the web page

    這個框架覆蓋了web應用程序的邏輯安全方面,並保護了web頁中的靜態數據。
  18. You can embed this framework, which offers a logical security design, in common presentation frameworks, such as struts

    可以嵌入這個框架,它為像struts這樣常用的表示框架提供了邏輯安全設計。
  19. Following are the main results of this thesis : 1 detailedly analyze some related schemes concerning group key management and authentication, especially logical key hierarchy ( lkh ) and one - way function tree ( oft ). we point out the reasons that oft fails to provide forward and backward security

    本論文基於這兩個方面,主要研究成果如下:對目前存在的多播組密鑰管理方案進行了詳細的研究分析,尤其是邏輯密鑰分層( lkh )和單向函數樹( oft )方案,並給出oft方案不能前向保密和後向保密的依據。
分享友人