數字安全網路 的英文怎麼說
中文拼音 [shǔzìānquánwǎnglù]
數字安全網路
英文
dsn digital secured network- 數 : 數副詞(屢次) frequently; repeatedly
- 字 : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 網 : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
- 路 : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
- 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
- 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。Among these, signature technology ensures participator ' s identification against malicious bugging and distorting, and plays an important role in protecting the security of networking communication
其中數字簽名技術能夠確認參與者的身份,防止惡意的偽造、竄改,在網路通信安全方面起到重要的保護作用。Computer and network has spreaded all over the society. information security and sciential property right have been risen to a new level. it is a focused problem that how to protect data and software sciential property right in field of informational technology
現代社會步入數字信息化高度發達的時代,計算機和網路遍及社會的每一個角落,信息安全和知識產權不可侵犯也提到了一個新的高度,如何保證數據信息的安全和軟體知識產權成了信息技術領域關心的熱點問題。The third part studies the actual questions of our e - government, and thinks there are 5 aspects of problem in the area : the people ' s ideas is the key to the problem, which is the largest resistance to build the e - government ; the old administrative system ca n ' t adapt the e - government ; it ' s serious to the " digital gap " question ; the information professional is scarce in the government ; the related laws and rules, especially the open information systems are imperfect, in face of the five problems, i bring forward the six countermeasures : the government should strengthen to educate the government employee on the related knowledge ; strongly push on reinventing government ; the " e - government " should be strugglingly developed ; resolve the " digital gap " question ; establish and perfect the correlative laws and rules ; try hard to settle the question of net safety
在論文的第三部分,我著重對我國電子政府目前的問題進行了提煉、分析,認為存在著五大方面,分別是:關鍵是人的思想觀念跟不上,成為電子政府建設的最大阻力;原有的行政體制不適應電子政府的發展; 「數學鴻溝( digitalgap ) 」問題嚴重;信息人才短缺;相關法律法規不完善、信息公開的制度保證不足。針對這五個方面,我提出了六點解決對策,分別是:大力加強對公務員的培訓和教育;強力推進政府再造:電子政務要大力發展;解決數字鴻溝問題,加大「兩軟一硬」投入;建立健全相關的法律、法規;努力解決好網路安全問題。Commercial banks utilize internet technology, network security technology, digital communication technology and database technology, all these computer technology to expand business, and to provide better service for customers. it has become an inevitable trend to push banking business on line, one of the representatives of web applications the banking industry will future develop
商業銀行利用網際網路技術、網路安全技術、數字通信技術、數據庫技術和計算機技術,發展商業銀行業務,為客戶提供更好的服務,以網上銀行為代表的web應用已成為未來銀行業發展的必然趨勢。The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before
隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒It ' s well known that the project documentations " storage and management have an very important effect on the development of all kinds of project, and as the information age is coming, network technology has been applied to this procedure gradually. this article mainly introduces the study and realization of a internet - based project documentation storage and management system which application programming frame is built with delphi6. 0 and sql server2000. based on the tcp / ip protocol, the system try to establish a c / s model with connection - oriented, dependable stream sockets and multithread technology to complete some especial data communications by networks, such as the files of project, directory of user, all self - defined commands or messages and their parameters, and so on
本文所研究的《基於internet的項目文檔存儲管理系統》通過delphi6 . 0和visualc + + 6 . 0相結合的開發平臺,結合sqlserver2000 ,將client server模式的數據庫技術和windowssocket網路通信技術進行集成,遵循tcp ip協議,同樣採用c s結構運行於internet ,通過服務器將處于各個不同物理位置的客戶機連接起來,形成一個交流平臺;其中,引入了目前國際上流行的先進的安全管理控制方法? ?角色控制理論對用戶進行權限分配,使擁有相應角色的人具有相應權限;然後系統自動根據組織部門或用戶的設立在服務器端生成相應的網路「虛擬文件櫃」 ,使擁有相應權限的人可以對相應文件櫃中的文檔進行整理;再通過多線程技術和windows套接字通信機制在tcp ip協議上實現了單個文件及目錄的傳輸。Afterwards, the paper investigates some key technologies including time delay, system security and data communication in system implementing and suggests that time delay problem could be solved through reducing the amount of data flow in the internet by using activex to encapsulate the client program by realizing communication between browser and client controlling program.
然後,論文對系統實施過程中的時延性、安全性和數據通信等關鍵性技術進行了研究,提出了採用activex技術來封裝客戶端程序,在瀏覽器中實現與控制服務程序的通信以減少網路數據量的方法來解決時間延遲的問題;以及採用安全套接字層協議ssl來解決安全性問題等的相應策略。Because of the characteristics of internet such as anonymity and publicity, e - commerce makes it possible for more and more people to be involved deeply in commercial activities in cyberspace. at the same time, it also puts forward a new security requirement : how to fight fraud and prevent exchange activities from the bargainer ' s misbehavior
由於網際網路絡匿名性及開放性的特點,電子商務的發展一方面使得人們在更廣闊的數字空間內進行商務活動的同時,對信息安全提出了新的需求:如何防止來自交易實體的欺詐和攻擊Our company has obtained the “ high - quality products recommended certificate ” by the america international quality certificate commission, “ anti - explosive conformity certificate ” issued by the national anti - explosive authoritative organ, “ anti - explosive electric apparatus installation and amending qualification certificate ” issued by the national anti - explosive electric products quality supervision and inspecting center, is china oil and natural gas first - order network supplier, zhejiang a - class following contract and enhancing on reputation enterprise and zhejiang industrial and commercial digital authentication enterprise, national anti - explosion electrical standard council commission unit, the iso9001 : 2000 quality system identification enterprise
本公司獲得美國國際品質認證委員會「高質量產品推薦證書」 ,國家防爆權威機構頒發的「防爆合格證」 ,國家防爆電氣產品質量檢驗中心頒發的「防爆電氣設備安裝、修理資格證書」 ,是中石油、中石化一級網路供應商,浙江省a級守合同重信用單位,浙江工商數字認證企業,全國防爆電氣標委會委員單位, iso9001 : 2000質量體系認證企業。With the rapid progress of information technology, it brings about serious problems in network information security
隨著數字信息技術的迅猛發展,網路上的信息安全問題日益突出,密碼學是解決信息安全問題的基礎。Higher - speed connections using cable modems or digital phone lines appear safe
而更高速的網際網路接入,如通過使用電纜數據機或數字電話線,就顯得較為安全。Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system
在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago
本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system
論文中對鐵路信息系統現狀進行了分析,歸納出明確的需求及目標,並依據信息系統安全中有關訪問控制框架及機制的相關理論設計並實現了鐵路信息系統安全框架中的數字證書( pki ca )及用戶目錄管理( ldap )系統、網路訪問代理和認證授權機制、基於pki ca的身份認證和授權系統及應用系統安全框架和支持平臺。The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature
本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature
網路數據傳輸安全主要解決在網路環境下用戶之間身份驗證、數據加密傳輸以及實現數字簽名三個方面問題:用戶身份驗證保證了通信的源點和目的點的正確性;數據加密傳輸保證了數據在網路的中間節點不會泄露通信秘密;數字簽名可以保證發送信息的一方不能對自己發送過的信息進行否認。Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties
傳輸層安全協議( tls )和安全套接字層協議( ssl )基於對稱密碼技術、非對稱密碼技術、消息認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證網路通信數據的機密性、完整性和對通信各方進行認證的機制。The paper aims at further research on the system of testing and evaluating network security with the sponsor of " the digital of fujian " - - the government information share platform of fujian province
本文就是在「數字福建」福建省政務信息共享平臺項目的資助下,對網路安全測評系統展開研究的。Furthermore, in the second part, the author makes a deeply discussion and research on the design scheme of dalian tv station non - linear av editing network including the double - net framework, the digital compress technique, the virtual storage technique, the choices of digital compress format, the account of terminal stations, the manage functions and security of the system, etc. finally, in the third part, the author introduces the progress of non - linear av editing network in the future, showing the choices of compress format, software function, i / o interface, whole system of programming and broadcast, combining with internet and interactive tv, points out the direction of tomorrow tv technology system
在此基礎上,隨后在文章第二部分對大連電視臺的非線性視音頻編輯網建設從其核心技術與具體網路設計方案進行了詳細的闡述。其核心技術主要包括雙網結構、數字壓縮技術、虛擬存儲技術等;具體網路設計方案則包括數字壓縮格式的選擇、站點的數量及功能、系統的管理功能及安全性分析等幾個方面。文章的第三部分則主要通過壓縮格式選擇、軟體功能、上下載介面、制播一體化、與internet結合、交互電視等方面展開對電視臺非線性編輯網路的發展的論述,指出未來電視技術系統的發展方向。分享友人