security function policy 中文意思是什麼

security function policy 解釋
安全功能策略
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • function : n 1 功能,官能,機能,作用。2 〈常 pl 〉職務,職責。3 慶祝儀式;(盛大的)集會,宴會。4 【數學】...
  • policy : n 1 政策,政綱;方針,方向;方法。2 策略;權謀;智慧;精明的行為。3 【軍事】政治,行政。4 〈蘇格...
  1. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  2. Strengthen the guide function of the scientific and technological policy on the development of public security science and technology

    加強科技政策引導推動我國公共安全科技發展
  3. On the basis of full investigation and the analysis of policy and economic development background, the author studies the desires of rural residents, creatively elaborates the function of the ethnic traditions in the rural social security. then the author suggests that model selection should be divided into long - term and short - term targets. the long - term target is to establish an integral security system to cover both the urban and rural areas

    通過對分析政策及經濟發展背景進行分析,在充分調查的基礎上,進行群眾意願分析,比較有新意的是對民族傳統在農村社會保障中的作用進行了分析闡述,提出在模式選擇上應分為遠期目標與近期目標,遠期目標是建立城鄉一體化的保障體系:近期內,在堅持土地保障和家庭保障為主的前提下,結合民族地區經濟、社會和文化發展的實際,選擇有別于城鎮保障體系的模式。
  4. We should attach more importance to following channels at present time : broaden monetary market function ; perfect stock mortgage loan ; develop investment institute ; explore investment banking business, including investment funds business channel, insurance business channel and security business channel ; make financial organization renovation. following policy suggestions should be applied : 1 ) perfect the policy environment ; 2 ) treat the problem rationally ; 3 ) implement financial mixed operation system in due time ; 4 ) foster financial market ; 5 ) enhance external supervision ; 6 ) deepen the construction of commercial banks ; 7 ) introduce bank capital into stock market in stages

    貨幣市場和資本市場的不協調發展使證券機構出現制度外與體制外融資或違規操作,必須在兩個市場間建立資金和信息對流的寬敞通道,在路徑設計上,當前應擴展同業拆借市場、國債回購市場等貨幣市場渠道功能;完善股票質押貸款,及時推出非券商股票質押貸款,並注重風險防範;大力發展養老基金、保險公司、信託基金等機構投資者,吸收銀行資金間接入市;拓展投資銀行業務,包括基金、保險業務渠道、券商業務渠道、公司業務渠道;設立證券金融公司或金融控股集團,進行組織制度創新。
  5. As for the residential finance policy, government should function as the subject to set up the residential security system and should reinforce the reform of the residential finance, in addition to mortgage accumulation fund loans, the government should found low - rate or rate - free loans for those families with low or medium income, set up risk security mechanism for the policy - related residential mortgage loans to provide them with loan guaranty

    在住房金融政策方面,政府理應成為構建住房保障體系的主體。政府應進一步深化政策性住房金融改革,除住房公積金貸款以外,應建立直接面向中低收入家庭發放的低息或無息貸款,建立政策性住房抵押貸款風險擔保機制,為低收入家庭貸款提供擔保,增強其購房能力,促進住房保障制度的順利構建。
  6. ( 2 ) research on ipsec architecture the goal, function and construction of ipsec design ; the analysis on the two security protocols of ipsec ? ah and esp including security function, packet format, application mode and processing operations of each ; mainly of the security association ( sa ) and its two modes : transport and tunnel, the instrument on organizing and managing sas security association database ( sad ), and that on managing security policies ? ? security policy database ( spd ) ; specific descriptions on internet key exchange ( ike )

    ( 2 ) ipsec協議體系的研究給出了ipsec的設計目的、作用和組成;分析了ipsec的兩種安全協議? ? ah和esp ,包括每種協議的安全功能、包格式、應用模式以及對數據包的處理過程;重點研究了安全聯盟( sa )以及兩種模式:傳輸模式和隧道模式,組織和管理sa的手段? ?安全聯盟數據庫( sad ) ,以及安全策略的管理手段? ?安全策略數據庫( spd ) ;最後,對internet密鑰交換( ike )進行了詳細介紹。
  7. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  8. In addition to have the function of public certificate authority , it has some advantages : enterprise can make security policy and digital certificate content. certificate can be managed by enterprise , and creating or revoking certificate is implemented at public certificate authority. enterprise can establish a trustable network environment by employing special digital certificate service , which can help the company save much money and human resource

    本文所論述的專用數字證書服務允許企事業單位向其內部網路和外部網路用戶發放數字證書,這些數字證書在功能上與公眾ca發放的數字證書完全相同,不同的是通過企事業單位與公眾ca協定,在明確了雙方的分工、責任和權限的基礎上,企事業單位可以自行確定安全策略、證書內容,自己公布證書撤銷列表,由企事業單位自己進行證書的前端管理而由公眾ca負責後端核心的ca任務。
  9. The article combines the european union ’ s ( eu ) foreign policy for the present development, the long historical origin of a integrated europe, and eu ’ s concept of a foreign policy integration, meticulously analyzes the eu ’ s foreign policy for economy, the “ common foreign and security policy ” and the problems which resulted in enlargement of the community during the advance of integration, and based on these, attempts to propose possible strategies and solutions for political, economical, and diplomatic aspects. the article mainly adopts taxonomy analytic method, dynamic analytic method, case - study analytic method, induction analysis and other methods. it enriches and enhances " the new function principle " theory, " policy accord between government " theory, " the international political economy influence ” theory and more, and take these as foundation, explains in theory level that from eu ’ s economical integration to foreign policy integration which it is a inevitable progression pattern of a multi - theory - supported development

    文章結合歐盟對外政策的發展現狀,從歐洲一體化的歷史淵源和歐盟對外政策一體化的概念入手,努力剖析了歐盟對外政策中對外經濟政策、共同外交與安全政策和東擴政策在一體化進程中存在的問題,並依此在政治、經濟、外交幾個方面嘗試性的提出了可能的應對措施與辦法,旨在對于歐盟對外政策一體化問題做出基本面的分析,為世界上其他一體化組織的發展、正確認識世界政治經濟格局的變化提供經驗借鑒和理論支持。文章主要採取分類系統分析法、動態分析法、個例分析法、歸納分析等方法,在理論上充實和豐富了「新功能主義」理論、 「政府間政策趨同」理論、 「國際政治經濟影響理論」等,並以此為依託,在理論層面上說明了歐盟由經濟一體化邁向對外政策一體化的發展是一個事物進程多種理論支撐的發展規律。
  10. As regards public organisations, such information is not available. ( b ) it is the government s established policy to adopt, as far as possible, software products of open standards. we will consider the function, security features, system compatibility, technical support and cost effectiveness of different types of software including oss, and decide which software product to use based on the principle of value - for - money

    (二)政府的一貫政策是盡可能採用符合開放標準的軟體產品,在決定採用何種軟體時,會以有關軟體的功能、安全性、系統兼容性、技術支援及成本效益等作為主要考慮因素,並會充分考慮包括開放源碼軟體在內的各種產品,按照物有所值的原則選用軟體產品,而不會優先選用個別品牌或技術類別。
分享友人