security checking 中文意思是什麼

security checking 解釋
安全檢查
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • checking : 產生裂縫
  1. Answer : in the emeritus before personnel end 1992, if former unit shows to already closed, stop, and, turn, and branch of clinking stage director is mandatory ; or have an unit but cannot offer " emeritus examine and approve a watch " the retiree that waits for a data, think individual account is medium uninterrupted length of service and actual abhorrent, but by the individual " emeritus card " on the account of uninterrupted length of service of account belongs to orgnaization of area social security to declare to place, adjust via checking approval hind to will give, but should not exceed out to have a job to the fixed number of year during retiring

    答: 1992年底以前退休的人員中,如原單位現已關、停、並、轉,且無上級主管部門託管的;或有單位但無法提供《退休審批表》等資料的退休人員,認為個人賬戶中連續工齡與實際不一致的,可憑個人《退休證》上記載的連續工齡記載向所屬區社保機構申報、經核實批準后將予以調整,但不應超出自參加工作至退休期間的年限。
  2. For farther research in practical status and birth mechanism of information man - oeuvre rent seeking, the thesis usees decision - making and game theory to build gamemodel, linking to character of information manoeuvre rent seeking and adding some hypothesis and parameter. use typical sampling with punish decision from security monitor committee of china, and do positive research, result shows that from those years information manoeuvre rent seekings in china have been in a high frequency state, many prescripts of < security law > have not been enforced well on checking of lawless cases, degree of punish cant hold back the information manoeuvre rent - seek - ing impulsing. at the effective monitor of stock market, not only probability of check is low, but rate of succeed is low too

    實證研究結果表明,近年來,我國證券市場的信息操縱行為處于高頻率狀態, 《證券法》的有關處罰規定在現實中沒有得到嚴格的實施,懲罰力度不足以有效遏止市場的尋租沖動,在市場有效監管上,不僅稽查的概率偏低,而且稽查的成功率也有待提高,合理改進稽查概率、稽查成功率、懲罰力度、中小投資者抗租能力等相關參數,是提高市場效率的有效途徑。
  3. Checking of airport tenant restricted area operator s security measures

    查察機場租戶禁區營運者施行的保安計劃
  4. The object of this paper is to verify security protocols with model checking tools

    本課題的研究目的是採用模型檢驗工具對安全協議進行驗證。
  5. First, this paper introduces the notation, categories and properties of security protocols, and formal methods to verify security protocols and small system model. the emphasis is the research and analysis of the principle of the model checking method. we study the mechanism and syntax of symbolic model checking tool smv, model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    文章主要介紹了安全協議的概念、分類和性質,安全協議的形式化驗證方法,以及小系統模型的原理;重點分析和研究了符號化模型檢驗工具smv的原理和語法及其對安全協議進行模型檢驗時的工作機理,而且使用smv對needham - schroeder公鑰協議和wooandlam對稱鑰協議進行了形式化建模與模型檢驗,發現了它們的安全漏洞。
  6. We research different kinds of formal methods, particularly study the mechanism of symbolic model checking tool smv, and finally we decide to adopt smv as the tool for the model checking of security protocols. with smv, we model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    本文研究了驗證安全協議的各種形式化方法,詳細研究了符號化模型檢驗工具smv的工作機制;確定了使用smv作為工具對安全協議進行模型檢驗,驗證了認證版needham - schroeder公鑰協議和wooandlam對稱鑰協議。
  7. Cschema language has a type system to guarantee the type correctness of the embedded calculation expressions and moreover this type system also generates a security view after type checking a cschema policy

    另外,這個類型系統也為通過檢查的cschema策略產生安全視圖。一個安全視圖是一個沒有包含保護類型的正規表達式類型。
  8. The time for checking and verification shall be determined and publicized by the social security agencies of this municipality

    核定時間由市社會保險經辦機構確定並公布。
  9. In this thesis, we ’ ve first introduced some conceptions of model checkingand knowledge reasoning. then we ’ ve mainly introduced my tutor ’ s methodof model checking temporal logic of knowledge. lastly, we ’ ve applied thismethod to two specific areas with our tool mctk : one problem is to verifythe winning strategies in the zero - sum games, which is to automatically findout whether there exists a way ensuring the necessarily win of players ; theother problem is to verify the knowledge based security protocols, whosesecure properties rely on the knowledge reasoning of the anticipants in theprotocol

    本文首先介紹了模型檢測和知識推理的基本概念,然後著重介紹了我導師所提出的模型檢測時態知識邏輯的方法,最後使用本實驗室研製的相關工具mctk來對兩個特定領域的問題進行了自動驗證:一方面的問題是驗證對弈中的必勝策略,即驗證對弈中的行棋雙方是否存在著必然獲勝的走法;另一方面的問題是驗證基於知識的安全協議,而這類協議的安全特性依賴于協議參與者的知識推理。
  10. Jinbiao is equipped with over 80 sets of first class production, checking and r d equipment to produce wire mesh fencing, grating, security fencing, barbed wire, chain link fence, pvc coating powder series product for worldwide customers

    本廠可為工程承包單位提供質優價廉的隔離柵產品,還可為隔離柵生產同行提供熱鍍鋅絲焊接鋼網浸塑塑粉。
  11. The implementation of operational security was illustrated by the practice of personal operations, public operations and bank certificates operations, etc. under the endeavors of the author and other colleagues, through the using of call center system as the operation working platform and the website www. 95599bj. com. cn as the main accessing net station for clients, e - banking system of beijing agriculture bank has successively developed such services as finance information, introduction for financial products, enterprise and personal finance operation disposals, bank certificates operations, funds, long - term trade for foreign exchange, internet electricity purchasing, capital checking bulletins for administration for industry and commerce, integrated financing cards, the opening of all the above services has built up a favorable image for our bank

    目前,北京農行網上銀行系統以已經投產的callcenter系統為業務處理平臺,以我行www . 95599bj . com . cn站點為對外客戶訪問的主網站,相繼開通了金融信息、金融產品知識介紹、企業和個人金融業務處理、銀證通業務、基金、外匯買賣遠期交易、網上購電、工商局驗資公示、綜合理財卡等服務,為我行樹立了良好形象。最後,本文提出了網上銀行系統業務的不足之處,提出了學習信息安全的收獲及我國網上銀行業務發展對策。
  12. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  13. The initialism of yet another u. s. government agency, the national security agency, which busies itself checking out foreign electronic and other communications

    另一個美國政府部門國家安全局( national security agency )的首字母縮略詞,它忙於檢查外來電子通信和其它通信。
  14. The platform is made up of five function modules, i. e. operations management module, operator job assistant module, training and checking module, information management module and security management module. the operations management module is the core of the platform, which consists of five subsystems : configuration management subsystem, accounting management subsystem, monitoring management subsystem, operating management subsystem and fault management subsystem

    運行管理分系統是平臺的核心,融合了電信管理網的五大管理功能(性能管理、配置管理、帳務管理、故障管理、安全管理)和11項管理業務,由配置管理、話單管理、話務糾察、作業管理和故障管理5個子系統構成。
  15. After checking in, passengers may be required to open their baggage for security inspection

    托運行李須復查時由旅客本人開箱接受檢查並核驗登機證及申報單。
  16. This dissertation has compared the new housing supply system with the old one, analyzed the background and current circumstance of implementing the policies of economical and suitable housing ( esh ), analyzed the current practice and the great achievement of economical and suitable housing ( esh ). the author has used the successful experience of the housing security system of the united states, japan, england, germany, hong kong, singapore ect, analyzed and summarized the experience of economical and suitable housing ( esh ) construction in china, set forth a series of theoretical and practical problems about the establishment and consummation of the regulation mechanism of economical and suitable housing ( esh ) construction in shaanxi, such as the total demand quantity model of economical and suitable housing ( esh ) in shaanxi, optimizing the management action of the state, studying on layout of economical and suitable housing ( esh ) in city, construction standard and area, exploiting and constructing in advanced - technological and sustainable development way, studying on cost control, the price control system and the checking of economical and suitable housing ( esh ) consumers

    本文運用定性分析與定量分析相結合的研究方法,通過對我國新老住房供應體系的比較和經濟適用住房政策實施的背景和現狀的分析,結合我國目前發展經濟適用住房的實踐,並以美國、日本、英國、德國、香港、新加坡等國和地區的住房保障制度的成功經驗為鑒,總結經驗,分析問題,全面系統的闡述了關于建立和完善陜西省城市經濟適用住房建設管理機制的一系列重要理論問題和實踐問題,諸如陜西省經濟適用住房需求總量分析模型,政府管理行為的優化,城市經濟適用住房布局研究,規劃建設標準,戶型面積標準,經濟適用住房建設要選擇資源節約型發展模式,經濟適用住房建造成本控制研究,售價測算系統和租售對象界定的研究等,形成了具有借鑒意義的經濟適用住房管理機制建設的建議。
  17. Means round - the - clock record checking facilities, added security, faster processing and a very cost - effective use of resources

    可以全日二十四小時翻查紀錄,令保安更嚴密、處理更快捷,而且成效顯著。
  18. Enables security checking on calls to a component

    在對組件的調用上啟用安全檢查。
  19. If security checking is to be enabled ; otherwise,

    如果啟用安全檢查,則為
  20. The average cost for fuel charge from san francisco, bay area to los angeles is around 50 one - way, not to mention the depreciation of your vehicle or extra cost if you rent a car, plus the long driving distance 6 to 7 hours ; on the other hand, if you choose to take flight, considering the safety, tedious airport security checking, waiting and the rapid increased airfare.

    汽油價格一漲再漲,愈來愈貴,自己開車到洛杉磯,單程汽油就得花費四五十元。若則搭飛機前往,除了昂貴花費不說,還得把時間浪費在提前幾小時到機場,檢查或等候辦理登記手續等瑣碎事上。現在坐巴士,也能準時安全到達。
分享友人