traditional threats to security 中文意思是什麼

traditional threats to security 解釋
傳統安全威脅
  • traditional : adj. 口頭傳說的;傳統的,慣例的,因襲的。 traditional Chinese medicine 中藥。
  • threats : 風險
  • to : adv 到某種狀態;〈特指〉到停止狀態;關閉。 ★也常和動詞結合,略去其後賓語,而構成成語: The door i...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Traditional security view cannot explain why the human - being is still facing various threats, so, the research on national security is not simply restricted to the fields of military, politics and diplomacy affairs, the non - traditional security issues such as economy, environment, information, transnational crime, drug trade, terrorism, smuggle, spreadi ng illness, which are connected with national security has become the hot spot, under this background, this thesis chooses the non - traditional security as the object to discuss so as to state the main issues of non - traditional security existing in china

    於是,國家安全的研究不再僅僅局限在軍事、政治和外交領域,與國家安全密切相關的經濟安全、生態環境安全、信息安全、恐怖主義、走私販毒、疾病蔓延等「非傳統安全」問題成為國內外學者研究的熱點問題,相關領域的學者們對此展開了熱烈的討論。正是在這種背景下,本文選擇了關于非傳統安全問題作為探討方向,目的是想通過在前輩研究成果的基礎上,對新世紀中國存在的主要非傳統安全問題進行全面的論述,進而尋找應對非傳統安全問題的思路與策略,為我國的國家安全戰略服務。
  2. The elements of traditional and non - traditional threats to security are intertwined, and the scourge of terrorism is more acutely felt

    傳統安全威脅和非傳統安全威脅的因素相互交織,恐怖主義危害上升。
  3. The drawback of the password is that it is easily given away. therefore there are great security threats in the access to information and resource in computer, hi an effort to confront the threats biometrics ( such as fingerprints, keystroke dynamics, and so on ) combined with the traditional verification methods may greatly increase the system security

    傳統的計算機系統登錄方式為單一的口令認證,其弊端是口令易被泄露,帶來安全隱患,而採用人的生物特徵(如指紋和擊鍵模式等)結合傳統認證方式可增強系統的安全性。
  4. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日誌。
  5. The papers will cover the threats posed by piracy and poverty to regional security, international legal responses to these threats, challenges facing regional environmental governance, and china s non - traditional security concerns with south asia. this research workshop is part of " the learning field project : repositioning hong kong in the asia pacific region ", which brings diplomats and officials from regional foreign ministries and organisations to hong kong on a six - week fellowship to undertake research on contemporary policy issues

    在這個為期半天的研討會里,與會者將就盜版和貧窮對地區安全所構成的威脅、國際社會在非傳統安全領域的合作、區域內各國在環保方面所面臨的挑戰、以及中國與南亞地區在非傳統安全領域加強合作等主要議題,進行深入的探討。
  6. " with the world becoming more and more interdependent and with the increase in non - traditional security threats, we face new opportunities and challenges to maintain world peace and development, " said cao

    曹說: 「隨著世界越來越相互依賴,以及新增的非傳統安全威脅,我們維護世界和平與發展面臨著新的機遇和挑戰。 」
分享友人