security control information 中文意思是什麼

security control information 解釋
安全控制信息
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  3. After discussing the market risks based on the individual investor behaviors, it describes the connotation, materialized model, and explores the risk ' s position in china security market. it finally draws the two risk - control solutions : 1 ) fosterage of rational individual investor ; 2 ) information disclosure

    本文提出了投資者風險決策中的理性判斷標準,認為理性概念是多層次多含義的,其精華是指一種最佳的、恰到好處的合理的狀態,一種最優化( optimization )的而非謀求數量最大化的方案就是理性選擇。
  4. Worldwide association of is professionals dedicated to the audit, control, and security of information systems. offer cisa qualification and cobit standards

    -一家以信息安全理論為主的研究單位,並提供信息安全產品設計和開發,安全解決方案,咨詢評估服務。
  5. Chapter 2 puts forward the internal control system framework and its core arguments through borrowing and initiating present achievements. it claims that the nature of the internal control for securities firms should be determined as one type of inherent system, distinguished from external control, that the management objectives of internal control system for securities firms include : security business objectives ( core objectives ), security operational environment objectives ( basic objectives ), security operational information objectives ( conditional objectives ) ; according to the management objectives, the internal control system for securities firms is divided into security business subsystem, security operational environment subsystem, and security operational information subsystem. the control objectives of internal control system for securities firms refers to guard against and eliminate the certain risks that the securities firms faced at the process of achieving management objectives with reasonable assurance

    主要內容是:證券公司內部控制的性質應確定為區別于外部控制的一種內在系統;證券公司內部控制系統所要服務的管理目標主要有證券經營業務目標(核心目標) 、證券經營環境目標(基礎性目標) 、證券經營信息目標(條件性目標) ;按照管理目標,可以將證券公司內部控制系統分為證券經營業務控制、證券經營環境控制、證券經營信息控制三大子系統;證券公司內部控制系統自身的控制目標是要合理地保證管理目標實現過程中面臨的特定風險得到防範和化解;證券公司內部控制系統的控制要素包括控制環境(基礎性要素) 、控制目標(起點性要素) 、風險識別(樞紐性要素) 、控制活動(核心要素) 、信息與溝通(條件性要素) 、監控(修正性要素) 。
  6. Xml security : control information access with xacml

    Xml安全:使用xacml控制信息訪問
  7. Class with the specified identity reference, access control type, child object type, active directory security inheritance information, and inherited object type

    使用指定的標識引用、訪問控制類型、子對象類型、 active directory安全繼承信息和繼承對象類型來初始化
  8. Skynet personal firewall edition is the use of the personal computer network security procedures, according to managers to set rules to guard the security network, provide powerful access control, information filtering and other functions, help you ward off network intrusions and attacks, prevent information leakage

    天網防火墻個人版是個人電腦使用的網路安全程序,根據管理者設定的安全規則把守網路,提供強大的訪問控制、信息過濾等功能,幫你抵擋網路入侵和攻擊,防止信息泄露。
  9. Security control of accounting information system based on network

    基於網路的會計信息系統的安全控制
  10. The security control planning of financial information network platform

    財務信息網路化平臺的安全控制規劃
  11. In view of the engineering practice of chmavc " s assistant materials management information system, this paper discusses some engineering problems relation to the design of a large database and to the application of database technology. exposition of two important aspects - - then design of a large database and improvement of database performance concerning practice is given. it includes the design of a data model, the compress technique of data, indexes set - up, optimization of inquiry, integrity check and security control

    從工程實踐的角度,論述了為實現系統功能而在數據庫設計和軟體結構設計中所採用的方法和技術;並論述了為達到系統性能而在實現中所採取的各項措施,重點討論了大型數據庫的設計和改善數據庫性能這兩個重要方面,內容包括設計數據模型、建立索引、查詢優化、完整檢查和安全控制等。
  12. To step up the integrity and security control of passports internationally, hksar biometric passports, embedded with a contactless integrated circuit chip containing the facial image and personal information of the holder, will be introduced in early 2007

    為了在國際層面加強對護照質素和保安的管制,將會在二零零七年年初推出具有生物特徵的香港特區護照。
  13. It is absolutely necessary to strictly manage the internal users and standardize network behaviors of these users in order to improve the security of computer network as well to ensure the security of information source and to weaken the security threaten, which are the aims of user management and network access control platform

    根據這一迫切需求,我們研製了「用戶上網管理控制平臺」 ,以加強內部用戶的管理和規范用戶的上網行為,從端系統著眼,通過確保信息源的安全來降低網路安全風險,該平臺的實現具有非常重大的現實意義和應用推廣價值。
  14. The intelligent house system ( ihs ) is the combination of actual houses and current technologies of computer, communication and control. by intelligent management, ihs can link all security devices, information equipments and household appliances in the house to form intact intelligent system though networks. furthermore, a comprehensive open district management system ( odms ) can be built by further interconnecting ihs to the administrative management system of district property ( pmis )

    智能住宅是住宅建築與計算機、通信、控制等技術有機結合的產物,它採用智能管理和控制的方法,將居室內各種安全設施、信息設備及家用電器,通過信息網路連接起來構成完整的智能化系統,並與小區物業管理系統互聯,形成了開放式的小區管理體系。
  15. Access control is a very important aspect in security of information system

    訪問控制是信息系統安全的重要方面。
  16. Access control, as one of 5 standard security services defined by the international standard organization, is an important mechanism for the security of information systems

    訪問控製作為國際化標準組織定義的五項標準安全服務之一,是實現信息系統安全的一項重要機制。
  17. This paper describes the designed and realized daqing petroleum administraive bureau oil field construction company office automation system ' s archetype and security measures of it in detail for information security and system security it has the different degree security mechwhsms from the grades of net, server, dataase, table shee and visual chart to grades of archive and local net the combination of the above secwtty controls can form an entir suit of security control thegy we have realized the control of documens delivering and receiving, electronic sea1s and documellt ' s conunot safely in this system

    針對信息安全和系統安全問題,本文詳細闡述了大慶石油管理局油建公司辦公自動化系統文檔數據庫設計實現的原型及其的安全措施。從網路級、服務器級、數據庫級、表單、視圖級、一直到文檔級、域級,都不同程度上設計了安全控制,從而形成一整套安全控制機制。系統具體實現了文件發送與文件接收的安全性控制、電子印章安全性控制、文件批辦的安全控制等安全功能。
  18. Class with the specified identity reference, access control type, and active directory security inheritance information

    使用指定的標識引用、訪問控制類型和active directory安全繼承信息來初始化
  19. Class with the specified identity reference, access control type, child object type, and active directory security inheritance information

    使用指定的標識引用、訪問控制類型、子對象類型和active directory安全繼承信息來初始化
  20. Class with the specified identity reference, access control type, active directory security inheritance information, and inherited object type

    使用指定的標識引用、訪問控制類型、 active directory安全繼承信息和繼承的對象類型來初始化
分享友人