security kernel 中文意思是什麼

security kernel 解釋
安全內核
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • kernel : n 1 (果實的)核,仁。2 穀粒,麥粒。3 內核,核心,要點。4 【原子能】(原子)核。5 【數學】(積分...
  1. Chapter 1 d emonstrates the stone of the strategy - the new security viewpoint, its reasons, main contents and primary characters and stresses that mutual confidence, benefices, equality and cooperate form the kernel of the viewpoint. guided by the viewpoint, chapter 2 analyses the ideological source of the new security viewpoint and the strategy and the strategy ' s essential grounds and main contents. to bring the strategy into reality, chapter 3 discusses the primary ways and puts forward some tactful advice to set up the cooperative security regime of the area

    論文第一章論述了我國亞太安全戰略的基石? ?新安全觀產生的原因、主要內容和基本特點,強調互信、互利、平等、合作是我國新安全觀的核心;第二章分析了我國新安全觀和亞太安全戰略的思想淵源、中國制定亞太安全戰略的基本依據和主要內容;第三章探討了實現該戰略的基本途徑和建立亞太安全合作機制的若干策略建議。
  2. Only relying on traditionary secure transport solution, such as ssl and tls, cannot meet security requirement of web services. so there need add message security to ensure the security of soap message that is the kernel of web services

    光依靠傳統的安全傳輸方案,如ssl 、 tls等不能滿足web服務的安全需要,需要增加消息安全來保證web服務的核心- soap消息的安全。
  3. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  4. It ' s one of the kernel technology of active network security, it not only can detect the outside intrusion action but also can find out the unauthorized activity inside the network

    它是動態網路安全技術最核心的技術之一,它不僅檢測來自外部的入侵行為,同時也可以發現來自網路內部用戶的未授權活動。
  5. As food production was continued inadequate to domestic needs in recent years, how to use effects of policy control and market mechanism becomes kernel problem of country works in order to give attention to two targets of maintaining food security and increasing farmers income

    由於近幾年國內糧食連續產不足需,如何發揮國家宏觀政策調控和市場機制,兼顧保障糧食供給和增加農民收入兩個目標,成為當前農村工作的核心。
  6. Intrusion detection, one of the most kernel technologies in dynamic security systems ( p2drr ), plays a very important role in the deep defense hierarchy system of network, which is the key of the conversion from static defense to dynamic defense, and as well a powerful tool of forcibly implementing the security policy

    入侵檢測技術作為動態安全系統( p2drr )最核心的技術之一,在網路縱深防禦體系中起著極為重要的作用,它是靜態防護轉化為動態防護的關鍵,也是強制執行安全策略的有力工具。
  7. The thesis implements acl mechanism in the kernel for r, w and x permission, and a loadable kernel module with the hooks inserted into kernel by the linux security module ( lsm ) for the extended permission

    提出、設計並實現了基於lsm安全框架的可動態加載的acl模塊,包括插入在內核中的12個用於細化的權限訪問檢查的鉤子函數。
  8. This thesis has made thorough research to ipsec protocol architecture and esp protocol and ah protocol. it has proposed the design methods of realizing vpn security gateway based on ipsec protocol under linux, and has discussed in detail the implementation of esp protocol and ah protocol in tunnel mode, as well as the secure kernel improvements to ip protocol stack on linux vpn security gateway machine

    本文對ipsec的體系結構、 esp協議、 ah協議進行深入研究,提出了在linux上實現基於ipsec協議的vpn安全網關的設計方法,並討論了在隧道模式下esp協議和ah協議在linux上的的具體實施和對linuxvpn安全網關上內核ip協議棧的安全內核改造。
  9. The efficiency of the security kernel is advanced

    使得整個安全核的效率提高。
  10. Its hardware design was analyzed from the master module, imported equipment modules, exporting equipment modules, data storage module, other components and the problem of the printer ’ s continuous printing from interrupted position was fixed in this course ; followed by, the software design including the operating system and the application software was discussed. the kernel of linux system was transferred to the motherboard of the novel fiscal cash register as its own operating system, in which the compilation of lcd driver and the printer driver was mainly focused on, and the application software was divided into the controlled tax software, the commercial software and power - fail protected disposal software for further discussion ; finally, the systemic reliability, security and electromagnetic compatibility were evaluated

    首先硬體部分主要由主控模塊、輸入設備模塊、輸出設備模塊、數據存儲模塊等部分組成,在硬體設計中解決了發票印表機掉電續打的難題;接著對稅控收款機的軟體設計主要從操作系統和應用軟體兩個方面討論:操作系統採用的是linux操作系統,先將linux內核移植到稅控收款機主板上,著重介紹了lcd 、印表機驅動程序編寫;應用軟體分為稅控軟體、商業軟體和掉電處理程序來討論;最後,對本文設計的稅控收款機系統的可靠性、安全性和電磁兼容性等方面進行分析和研究。
  11. Linux is a well known os of its open source code and better security. after the deep analysis of network and traffic control mechanism in linux kernel, we finally design and implement a prototype of vpn gateway based on diffserv under linux using unified modeling language ( uml ) from object - oriented perspective. at last, we construct an actual test environment, and the test results indicate that our prototype can not only implement the main functions of ipsec family, but also support the qos of vpn based on the application with good functions of shape and bandwidth traffic control

    Linux是一個基於開放源碼的操作系統,也是目前認為比較安全的操作系統,本文最後在對linux內核中的網路和流量控制機制進行深入分析和研究的基礎上,從面向對象的角度,運用標準建模語言uml ,設計和實現了一個基於區分服務的vpn網關原型,並且構建了一個實際的實驗和測試環境,對系統進行了測試,測試結果表明:原型系統在實現ipsec協議族主要功能的基礎上能夠給予用戶基於應用的qos保證,具有較好的流量整形和帶寬控制功能。
  12. The csm is the kernel module among the parts of security middleware, its responsibility is to manger the security service provider module, to provide a common interface to user, to hide the difference of various security implement, to dispatch the user ' s request to sspm, to ensure the system can run steady, as well as it ' s basic career of the security middleware ' s function and characteristic

    Csm是安全中間件的核心,它負責管理安全服務提供者模塊,提供統一的介面,屏蔽各種安全實現之間的差異,將用戶的服務請求分發到各安全服務提供者模塊,保證系統的穩定運行,是安全中間件各種功能和特性的基本承載者。
  13. On the basis of it, i design and implement ipsec in the network protocol stack of linux kernel, which can verify the encryption, integrity and authenticity of data at the ip level. it solves the problem of identification deceit, malicious modification and interception when datum is transmitted on the network, and the security of network transmission is improved greatly

    在此基礎上,在linux內核ip協議棧中設計並實現了ipsec ,在ip層提供數據傳輸的機密性、完整性和真實性,解決ip數據報在網路中傳輸時的身份偽造、被人篡改以及被竊聽的問題,使網路傳輸安全性得到很大提高。
  14. This paper, after researching and analysing the security theories and technologies of traditional security operating system, with the characteristics of the embedded system, puts forward a security kernel frame which is suitable for embedded operating system : esk _ ec ( embedded security kernel of win ce )

    本文在研究分析傳統安全操作系統的安全理論和技術的基礎上,結合嵌入式操作系統的特點,提出了一種適合於嵌入式操作系統的安全核框架: esk _ ec ( embeddedsecuritykernelofwince ) 。
  15. Single security policy is implemented in the traditional security kernel

    摘要傳統安全內核只實施單一的安全策略。
  16. 5. in the security kernel, in order to pick up the speed of decision - making, this paper adopts decision - making buffer techonlogy

    5 .在安全核中,為了加快決策速度,採用了決策緩存技術。
  17. For satisfying the special request of the system, it described a security policy about implementing confidentiality and integrality in the security kernel

    描述了如何在一個安全內核中同時實施機密性和完整性安全策略,滿足系統的特殊安全要求。
  18. Base on the theories upwards, this paper realizes the security kernel prototype in the win ce4. 2 operating system. after test, it is indicated that the functions and the

    基於以上理論,在嵌入式操作系統wince4 . 2操作系統中實現了安全核原型,並通過驗證測試,表明該安全核的功能和性能滿足嵌入式系統的要求。
  19. The security kernel has the innovations as below : 1. base on different applications, the system administrator can put up the security policy. he can set up different security levels, and put different security purviews to different security levels

    該安全核具有以下創新: 1 .依據應用場合不同,允許系統管理員進行安全策略配製,即設置不同的安全級別,以及對不同安全級別賦予不同的安全權限。
  20. In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management

    筆者通過對石家莊市工商銀行中間業務現狀的分析,採用「安全攻擊路徑分析」和「安全威脅因素分析」方法對該行中間業務的安全威脅進行了詳細的分析,提出了適當的安全需求,採用多種安全設備如vpn設備、防火墻、 ids 、安全管理中心、安全內核、防病毒等,設計出了保護中間業務的技術安全防護方案,並提出了安全管理方面的措施建議,最後,給出了保證中間業務正常運行的安全服務方案。
分享友人