security requirement 中文意思是什麼

security requirement 解釋
安全性要求
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • requirement : n. 1. 要求,需要。2. 要求物,必需品;需要量;必要條件,資格 (for)。
  1. You can choose different encipher algorithms according to requirement. aes is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192and 256 bits. because the length of block and key has been expanded, security has been enhanced

    Aes ( advancedencryptionstandard )是fip ( federalinformationprocessingstandardspublication )在2001年6月發布的草案,它是分組加密演算法,消息分組為128bit ,有三種密鑰長度128bit 、 192bit 、 256bit ,由於分組長度和密鑰長度加長使得安全性大大的提高,它有望成為21世紀的加密標準。
  2. It uses xml encryption, xml signature and ssl technology to design and implement the solution of transmission of tender and evaluation documents separately which are based on the different security requirement. the solutions guarantees the secrecy, incontestability, integrity and identity authentication in the transmission of the bidding documents

    在標書傳遞子系統中根據不同的安全需求,使用xml加密、 xml簽名和ssl技術分別為投標書和評標書設計並實現了安全傳遞的方案,確保了標書傳遞中的保密性、完整性、長期不可否認性、時間有效性和用戶身份正確性。
  3. Only relying on traditionary secure transport solution, such as ssl and tls, cannot meet security requirement of web services. so there need add message security to ensure the security of soap message that is the kernel of web services

    光依靠傳統的安全傳輸方案,如ssl 、 tls等不能滿足web服務的安全需要,需要增加消息安全來保證web服務的核心- soap消息的安全。
  4. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。
  5. Security requirement of cotton processing machinery

    棉花加工機械安全要求
  6. With above reasons such as long operational lifetime, high reliability and security requirement, spacecraft should design shield as protection

    由於上述原因,長壽命、高可靠性、安全性要求的航天器在發射之前,就應該進行防護設計。
  7. Because of the characteristics of internet such as anonymity and publicity, e - commerce makes it possible for more and more people to be involved deeply in commercial activities in cyberspace. at the same time, it also puts forward a new security requirement : how to fight fraud and prevent exchange activities from the bargainer ' s misbehavior

    由於網際網路絡匿名性及開放性的特點,電子商務的發展一方面使得人們在更廣闊的數字空間內進行商務活動的同時,對信息安全提出了新的需求:如何防止來自交易實體的欺詐和攻擊
  8. The sturdy automation appliances not only meet the fundamental security requirement, also provide an integral automation solution which is highly energy - saving. with the abundant resource of teco group, sa shall expand its global branches to provide client - orient post - sale service. through constant innovation and investment in research, sa aspires to becoming one of the most outstanding business groups in the world

    在東元集團豐富資源的統合綜效下,電控事業部將擴大建立在歐美亞日的全球產銷據點,透過持續的創新及厚植研發技術,提供以顧客滿意為導向的產品及完善的售後服務,逐步實現成為世界知名一流品牌大廠。
  9. This thesis demonstrated in detail the bank organization, operation procedures, security requirement analysis, etc. it also lucubrated the information security theory, and analyzed the information security structural levels. based on the above results, a security design scheme was developed from a technically and operationally integrated consideration for e - banking system in beijing agriculture bank. technique factors consisted of security controls of website, including the firewall strategies, break - in testing and system scanning, ca digital certification system and security controls

    在研究了信息安全的相關理論的基礎上,提出了北京農行網上銀行系統的技術和業務上綜合考慮的安全設計方案,前者包括針對網站的安全控制,如包括防火墻策略、入侵檢測和系統掃描、 ca數字證書體系、安全控制等,後者以個人業務、對公業務、銀券通業務等流程說明業務的安全實現。
  10. This dissertation analyzed the risks of the current applications and characteristics of the e - government system of the state development planning commission ( sdpc ) and recommended the establishment of certificate center based on pki for sdpc e - government to address the security requirement of it, with the application of information system security and information security engineering theories

    本文以信息系統安全和信息安全工程理論為指導,根據國家計委電子政務應用需求現狀和特點進行風險分析,從而根據安全需求,提出建立基於pki的國家計委電子政務證書中心的要求。
  11. The c / s pattern can be used in the limited - ranged operations which are characterized by high security, high frequency of data processing, heavy transmission of data, good mutual - communication and fixed - places, such as the input and maintenance of graduate information, the management of code table, data backup and recovery. whereas, the b / s pattern can be used in the wide - ranged operations, which are characterized by low security requirement and mutual - communication, and flexible places, such as the release of requirement, the query of graduate information, on - line registration of graduate data and all kinds of query and statistic

    在安全性要求高、數據處理頻繁、數據傳輸量大,交互性強、地點固定的小范圍內的業務,如畢業生信息錄入及維護、代碼表管理、數據備份和恢復等模塊採用c s模式實現;而在安全性和交互性要求不高、地點靈活的廣域范圍內的業務,如需求信息發布、生源信息查詢、畢業生詳細資料在線登記和各種查詢、統計等模塊採用b s模式。
  12. The security requirement i am concerned with is

    我所關注的安全性要求是
  13. The author analyzed the risks of securities on - line trading system based on network structure and application requirement of great wall securities on - line trading system, advanced the security requirement and objective of securities on - line trading system. the security project of securities on - line trading was designed by use of mature and advanced security technology and products.,

    論文從證券行業的業務流程和實際需求出發,對該信息系統中的物理環境、網路通訊、操作系統、應用系統以及安全管理等環節的安全風險進行了具體的分析,在此基礎上提出了系統各層次的安全目標、設計了網上證券交易系統安全方案。
  14. On the basis of the integrate security program being implemented in hubei electric power company right now and in connection with the security requirement of the enterprise information network, the strategy and thinking to cope with the internal network security and the application security of electric power information network were investigated, in the aspects of technique, application, security management and so on

    摘要在湖北省電力公司正在實施的整體安全解決方案的基礎上,結合電力企業信息網路的安全需求,從技術、應用和安全管理等方面探討如何解決電力信息網路內部安全和應用安全問題的實施策略和思路。
  15. At the same time the national drinking water quality standard is enhanced more. the traditional regular water treatment being difficult to meet the security requirement of drinking water. explore new economical and practical water treatment method is a great subject in front of our country ' s water treatment academician

    隨著水資源短缺和水源污染問題的日益嚴重及國家生活飲用水水質標準的進一步提高,傳統的常規水處理工藝已難以滿足生活飲用水的安全要求,探索新的經濟實用的水處理方法是擺在我國水處理科技工作者面前的重大課題。
  16. The methods for the deployment of web applications both in client and server side are highlighted. security in a networked information system is a very complex task that ranges fonn the level of crypto - primitives over crypto - protocols to the level of organizational matters and legislation. according to the information security requirement and security policy of a cooperative environment, an information security model is shown and three key security mechanisms are discussed in the following part

    因此本文首先根據基於web的協同產品開發的特點,綜合運用計算機支持的協同工作和分散式對象技術的理論,提出了基於web的協同產品開發環境的體系結構,為全文的論述奠定了基礎基於web的協同產品開發中信息安全研究應從系統設計的高度,全面地考慮系統的安全模型、安全需求和安全策略,合理的信息安全模型是保證產品開發過程安全、可靠、可控的前提。
  17. Firstly, based upon the security requirement of the hierarchy protection standard system and the information - centric concept of the mccumber cube model, the thesis presented a new testing and assessment method not constrained by organizational or technical changes for the protection of the information systems

    首先,基於《劃分準則》標準體系結構及其安全要求,將以信息為中心的mccumbercube模型思想引入到信息系統安全等級測評工作中,提出了一種不受技術發展和信息系統變化而改變的安全等級測評方法。
  18. In the paper, the analysis of security characters and security requirement of wlan is made at first

    本文首先分析了無線網路的安全特點和安全需求。
  19. On the basis of comparing cc with other risk assessment criteria, we find cc may be tailored according to the concrete system and it fits website risk assessment. thirdly, this thesis analyze the security requirement of website according to web server protection profile based on cc. fourthly, through consulting related risk assessment standard and model and web server protection profile of cc, this thesis brings forward website risk assessment model, confirms the recognition method and assessment method of the property, threat and vulnerability of website information issue system, and establishes relevant evaluation guideline and half - quantitative risk computational method and formulates the risk rank determination criterion

    本文首先介紹了網站安全的定義、目標和國內外風險評估的研究現狀;然後對信息安全風險評估的基本概念和理論進行了闡述,同時簡要介紹了國際風險評估標準的發展現狀,並詳細闡述了通用準則cc ( commoncriteria ) ,在將cc和其他風險評估標準進行比較分析的基礎上,發現cc標準可以根據具體的系統作定製開發,比較適合網站風險評估;接下來,本文結合cc標準下制定的webserverprotectionprofile ,分析了web網站的安全需求;隨后,本文通過借鑒相關的風險評估標準和模型,以及cc的webserverprotectionprofile ,提出網站風險評估模型,確定網站的資產、威脅和脆弱性的識別方法和評價準則,並構造出半定量的風險分析方法,最終制定風險等級判定準則;最後,通過一個實例來驗證本文所提出的基於模型的半定量風險分析方法的實用性。
  20. This thesis, according to the information system security methodology, and combining the writer ' s working experience at the front desk business application system of icbc ( industrial and commercial bank of china ), analyzed and the present security problems within traditional front desk business application system of banks, and based on the system risk analysis, the thesis presents the security requirement of the front desk business application system, and then the frame of the front desk business security system is established, the realization solution for the front desk business security system provided

    本文根據信息系統安全的一般原則,結合本人在工商銀行前臺業務應用系統工作的經驗,對商業銀行傳統的前臺業務應用系統中存在的安全問題進行了分析、歸納,在對其風險進行系統分析的基礎上,提出了商業銀行前臺業務應用系統的安全需求,並據此建立了前臺業務信息系統安全體系的框架,設計出了針對商業銀行的前臺業務的信息系統安全的實現方案。
分享友人