security level 中文意思是什麼

security level 解釋
安全級別
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • level : n 1 水平儀,水準儀;水準測量。2 水平線,水平面;水平狀態;平面,平地。3 水平,水準;水位;標準;...
  1. According to trusted compeer seeffiity evaluation standard ( tgskt ), tfae security level of ^ armostall dbms is c2, and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource

    按照可信計算機評估標準tcsec看,當前多數dbms系統只具備c2級安全性,這種安全性對數據的保護是不夠的。提供一個可靠的mlsdbms系統來保護系統信息資源是必要的,迫切的。
  2. The two - point to earth short fault may cause short currents whic h can lead to serious accident. so it is necessary to monitor the state of field windings of turbo - generator and detect the kind of fault and predict its inclination. thus the security level of power system will be improved

    由於發電機轉子兩點接地故障時會產生較大的短路電流,導致惡性事故的發生,因此對發電機轉子繞組進行狀態監測,判斷短路故障的形式和趨勢是十分必要,有助於提高系統安全運行水平。
  3. Higher security level is required while more and more commerce activities and government affairs are done over lntemet. the authentication of activity paticipates, the confidential ofdat4 the integrity of data and the ability to anti - disavow are the most important ones among all security requirements

    利用開放式網路開展商務和政務活動對網路的安全性提出了更高的要求,最為重要的安全性要求包括:參與方的身份認證,會話的機密性,會話的完整性和抗抵賴性。
  4. By investigating, we got three main points : s ocial endowment security system is in accordance with the national economy scheme. the system is restricted by many factors and the economy is the most important thing. the security level must be fit with the economy level

    通過以上考察,發現:養老保障制度是與國家的基本經濟制度相一致的,隨著市場經濟的發展和生產社會化程度的逐步提高,以社會保障為基本特徵的現代養老保障制度是必然選擇。
  5. Adequate security level

    足夠的安全管理級別。
  6. Lower security level, perfect social assistance system and developed philanthropy are the basic characteristics of american welfare system

    摘要保障水平相對較低、社會救助體系健全和慈善事業發達是美國的社會福利制度的基本特徵。
  7. Hence in the following steps, you are required to choose the security level and provide a profileusername and password to be stored for identification and access permissions

    因此以下幾個步驟會要求您選擇安全等級,及提供使用者名稱及項目密碼,儲存以後作認明身份和存取許可之用。
  8. Information system ; security level ; evaluation ; criterion

    信息系統安全等級評測標準
  9. If the ship is at a lower security level than the port facility it intends to use, she should increase the security level to meet the port facility and take additional or special security measures

    當船舶保安等級低於其靠泊港口設施的保安等級時,應立即提高船舶的保安等級,並採取相應的附加或特殊保安措施。
  10. It has a very complete products line, from cat - 5, cat - 6 to cat - 7, from utp, ftp to optic - fiber, information module, patch cord and headband etc. the products number has come to more than 500. it can provide all series of cabling products for the wider users, especially, the ftp cabling system is the expertise of schneider electric. no matter it is workshop that endures strong the electromagnetism radiation interfere, or governmental organs that have high security level requirement and the cabling system can " t product electromagnetism radiation, several patent ftp technologies that schneider electric has can ensure the safety of network

    據悉,梅蘭日蘭infra +系列定位於高端客戶群體,以品質著稱,自2001年以來已在法國的本土綜合布線市場佔有率名列第一,擁有非常完整的產品線,從超5類、 6類到7類,從非屏蔽、屏蔽到光纖,以及信息模塊、跳線、面板等等,產品編號已達500多個,可以為廣大的用戶提供全系列布線產品,尤其是屏蔽布線系統更是施耐德電氣的專長,無論電磁輻射干擾強烈的工廠生產車間,還是對網路安全性要求較高、布線系統不能產生電磁輻射的政府機關中,施耐德電氣所擁有的多種專利屏蔽技術都能夠確保網路安全。
  11. For security concern, this import function will set the ie browser s security level of the imported e - cert as " high " and the e - cert private key as " non - exportable ". the password you set for your e - cert imported into ie ( point 4 above ) is required when your e - cert in ie ( including the private key ) is used

    基於保安上的考慮,此匯入程式會將匯入ie瀏覽器的電子證書的安全性等級設定為高,而你的電子證書的私人密碼匙或稱私密金鑰會設定為不能匯出。
  12. Since the poor situation of the security of wlan system, after having analyzed many security mechanisms, we decide to implement eap - tls to improve the security level for its two - way authentication and dynamic key mechanisms

    針對目前無線局域網安全性能差的現狀,本文在比較分析眾多的無線局域網安全機制后,提出並實現了eap - tls雙向認證和動態密鑰機制,從而提高了無線局域網的安全性能。
  13. For this, based on analyzing formalized design method, principles and architecture for designing formal model are proposed, then according to them, the model is designed hierarchically. first, a formal framework for supporting multipolicy is presented. second, some component models are constructed, including dynamically mediated security level rang multilevel security model dmlr - mls, which is used to implement confidentiality policy, and renamed as dblp model after it is combined with dac model, based - dte integrity protection security model dte - ipm, and privilege control model pcm - rbpc based on capability mechanism, role mechanism and dte privilege mechanism

    本文主要研究開發高安全等級的操作系統所必需的安全策略形式模型,為此我們從形式設計方法的探討入手,確定模型設計的基本原則及組織結構,然後根據確定的組織結構逐步展開設計,提出支持多策略的形式框架、實現機密性策略的可動態調節安全級范圍的多級安全模型dmlr _ mls (本文把它與dac模型合在一起形成dblp模型) 、基於dte技術實現完整性保護的形式模型dte _ ipm及基於權能、角色及dte的特權控制模型pcm _ rbpc 。
  14. This is a contradiction to save a gradually longer key in a limit room. we proposed a solution to combine the elliptic curve cryptosystem and digital - image - hiding, the advantage of ecc ’ s shorter key at the same security level will solve the problem in some extent, at the same time make the transfer of document secure and also cryptic

    通過對現有商務文檔安全傳輸策略的研究和對比后,本文提出將橢圓曲線密碼體制與圖像隱藏結合,利用ecc在相同安全強度下密鑰長度短的特點在一定程度上解決這一矛盾,同時達到安全性和隱蔽性的結合,能在一定程度上解決第三方的攻擊。
  15. The original equipment manufacturer determines the platform security level of the device and its security policy and can also provide a security administrator with custom permissions for granting access

    原始設備製造商( oem )確定設備的平臺安全級別和安全策略,還可以為安全管理員提供用於授予訪問的自定義權限。
  16. Therefore the improving method of the integrity in blp model is brought forward in this dissertation. the title of the integrity level should be added to both the subject and the object. while the security level of the object reigns the level of the subject, this means the low s ecrecy process wants to write the high secrecy data up, the integrity level of the subject and the object should be judged additionally

    為此,我們提出blp安全模型的完整性改進方法,為主體和客體增加完整性級別標識,當客體的安全級嚴格支配主體的安全級時,即低保密性進程要進行向上寫高保密性數據時,要增加判別主體和客體的完整性級別,此時,主體完整性級別必須支配客體的完整性級別。
  17. Should the file transfer protocol force users to authenticate for example, using sftp, or is an anonymous and unencrypted access suitable for the required security level

    文件傳輸協議是否強制用戶進行認證(比如使用sftp ) ,或者對必需的安全層級來說匿名的、不加密的訪問是否合適?
  18. Computer network vulnerability assessment is the important part of the computer security domain, it is very important to improve oneself security level of computer network

    摘要計算機網路脆弱性評估是計算機安全領域的重要組成部分,對于提高計算機網路自身的安全水平至關重要。
  19. Ecc can provide high security. under the same security level, ecc has smaller key and lesser consurne ( computation, memory, bandwith and power needed ), so it is ideal in constrained systems. in this paper, the author primarily introduce elliptic curve cryptosystems

    橢圓曲線密碼體制不但可以實現高度安全性,而且在同等安全強度下,橢圓曲線密碼體制具有較短的密鑰長度和較小的開銷(所需的計算量、存儲量、帶寬、軟體和硬體實現的規模等) ,因而,橢圓曲線密碼體制在受限環境中是理想的選擇。
  20. Portfolio overviews drill - down to the security level

    從全貌的投資組合層面到深入的單個證券層面。
分享友人