數字安全網路 的英文怎麼說

中文拼音 [shǔānquánwǎng]
數字安全網路 英文
dsn digital secured network
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的隱患的基礎上,歸納出其六大要素,即系統的可靠性、交易者身份的真實性、據電訊的機密性和完整性、據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單體系的建立以及系統保護法規,第四章則介紹了電子提單的認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了簽名的概念及原理,並以bolero為例介紹了簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的據電訊的不可抵賴性。
  2. Among these, signature technology ensures participator ' s identification against malicious bugging and distorting, and plays an important role in protecting the security of networking communication

    其中簽名技術能夠確認參與者的身份,防止惡意的偽造、竄改,在通信方面起到重要的保護作用。
  3. Computer and network has spreaded all over the society. information security and sciential property right have been risen to a new level. it is a focused problem that how to protect data and software sciential property right in field of informational technology

    現代社會步入信息化高度發達的時代,計算機和遍及社會的每一個角落,信息和知識產權不可侵犯也提到了一個新的高度,如何保證據信息的和軟體知識產權成了信息技術領域關心的熱點問題。
  4. The third part studies the actual questions of our e - government, and thinks there are 5 aspects of problem in the area : the people ' s ideas is the key to the problem, which is the largest resistance to build the e - government ; the old administrative system ca n ' t adapt the e - government ; it ' s serious to the " digital gap " question ; the information professional is scarce in the government ; the related laws and rules, especially the open information systems are imperfect, in face of the five problems, i bring forward the six countermeasures : the government should strengthen to educate the government employee on the related knowledge ; strongly push on reinventing government ; the " e - government " should be strugglingly developed ; resolve the " digital gap " question ; establish and perfect the correlative laws and rules ; try hard to settle the question of net safety

    在論文的第三部分,我著重對我國電子政府目前的問題進行了提煉、分析,認為存在著五大方面,分別是:關鍵是人的思想觀念跟不上,成為電子政府建設的最大阻力;原有的行政體制不適應電子政府的發展; 「學鴻溝( digitalgap ) 」問題嚴重;信息人才短缺;相關法律法規不完善、信息公開的制度保證不足。針對這五個方面,我提出了六點解決對策,分別是:大力加強對公務員的培訓和教育;強力推進政府再造:電子政務要大力發展;解決鴻溝問題,加大「兩軟一硬」投入;建立健相關的法律、法規;努力解決好問題。
  5. Commercial banks utilize internet technology, network security technology, digital communication technology and database technology, all these computer technology to expand business, and to provide better service for customers. it has become an inevitable trend to push banking business on line, one of the representatives of web applications the banking industry will future develop

    商業銀行利用技術、技術、通信技術、據庫技術和計算機技術,發展商業銀行業務,為客戶提供更好的服務,以上銀行為代表的web應用已成為未來銀行業發展的必然趨勢。
  6. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和技術的飛速發展,圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在環境下的信息問題也日益顯露出來.圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將、序列號、文、圖像標志等版權信息嵌入到多媒體據中,以起到版權保護、秘密通信、據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  7. It ' s well known that the project documentations " storage and management have an very important effect on the development of all kinds of project, and as the information age is coming, network technology has been applied to this procedure gradually. this article mainly introduces the study and realization of a internet - based project documentation storage and management system which application programming frame is built with delphi6. 0 and sql server2000. based on the tcp / ip protocol, the system try to establish a c / s model with connection - oriented, dependable stream sockets and multithread technology to complete some especial data communications by networks, such as the files of project, directory of user, all self - defined commands or messages and their parameters, and so on

    本文所研究的《基於internet的項目文檔存儲管理系統》通過delphi6 . 0和visualc + + 6 . 0相結合的開發平臺,結合sqlserver2000 ,將client server模式的據庫技術和windowssocket通信技術進行集成,遵循tcp ip協議,同樣採用c s結構運行於internet ,通過服務器將處于各個不同物理位置的客戶機連接起來,形成一個交流平臺;其中,引入了目前國際上流行的先進的管理控制方法? ?角色控制理論對用戶進行權限分配,使擁有相應角色的人具有相應權限;然後系統自動根據組織部門或用戶的設立在服務器端生成相應的「虛擬文件櫃」 ,使擁有相應權限的人可以對相應文件櫃中的文檔進行整理;再通過多線程技術和windows套接通信機制在tcp ip協議上實現了單個文件及目錄的傳輸。
  8. Afterwards, the paper investigates some key technologies including time delay, system security and data communication in system implementing and suggests that time delay problem could be solved through reducing the amount of data flow in the internet by using activex to encapsulate the client program by realizing communication between browser and client controlling program.

    然後,論文對系統實施過程中的時延性、性和據通信等關鍵性技術進行了研究,提出了採用activex技術來封裝客戶端程序,在瀏覽器中實現與控制服務程序的通信以減少據量的方法來解決時間延遲的問題;以及採用套接層協議ssl來解決性問題等的相應策略。
  9. Because of the characteristics of internet such as anonymity and publicity, e - commerce makes it possible for more and more people to be involved deeply in commercial activities in cyberspace. at the same time, it also puts forward a new security requirement : how to fight fraud and prevent exchange activities from the bargainer ' s misbehavior

    由於絡匿名性及開放性的特點,電子商務的發展一方面使得人們在更廣闊的空間內進行商務活動的同時,對信息提出了新的需求:如何防止來自交易實體的欺詐和攻擊
  10. Our company has obtained the “ high - quality products recommended certificate ” by the america international quality certificate commission, “ anti - explosive conformity certificate ” issued by the national anti - explosive authoritative organ, “ anti - explosive electric apparatus installation and amending qualification certificate ” issued by the national anti - explosive electric products quality supervision and inspecting center, is china oil and natural gas first - order network supplier, zhejiang a - class following contract and enhancing on reputation enterprise and zhejiang industrial and commercial digital authentication enterprise, national anti - explosion electrical standard council commission unit, the iso9001 : 2000 quality system identification enterprise

    本公司獲得美國國際品質認證委員會「高質量產品推薦證書」 ,國家防爆權威機構頒發的「防爆合格證」 ,國家防爆電氣產品質量檢驗中心頒發的「防爆電氣設備裝、修理資格證書」 ,是中石油、中石化一級供應商,浙江省a級守合同重信用單位,浙江工商認證企業,國防爆電氣標委會委員單位, iso9001 : 2000質量體系認證企業。
  11. With the rapid progress of information technology, it brings about serious problems in network information security

    隨著信息技術的迅猛發展,上的信息問題日益突出,密碼學是解決信息問題的基礎。
  12. Higher - speed connections using cable modems or digital phone lines appear safe

    而更高速的接入,如通過使用電纜據機或電話線,就顯得較為
  13. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於證書的認證方式,實現用戶上資格審查;針對審計,重點研究了審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。
  14. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種服務和實現的課題,並通過一些具體實現的實例進行闡述,具體排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈、干擾情況、拓撲結構以及核心協議等;然後介紹了通信的基礎知識,討論了osi系統中的四層結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  15. In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system

    論文中對鐵信息系統現狀進行了分析,歸納出明確的需求及目標,並依據信息系統中有關訪問控制框架及機制的相關理論設計並實現了鐵信息系統框架中的證書( pki ca )及用戶目錄管理( ldap )系統、訪問代理和認證授權機制、基於pki ca的身份認證和授權系統及應用系統框架和支持平臺。
  16. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換模型,詳細地給出了一個政府的保密系統設計方案。
  17. On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature

    據傳輸主要解決在環境下用戶之間身份驗證、據加密傳輸以及實現簽名三個方面問題:用戶身份驗證保證了通信的源點和目的點的正確性;據加密傳輸保證了據在的中間節點不會泄露通信秘密;簽名可以保證發送信息的一方不能對自己發送過的信息進行否認。
  18. Based on symmitric cryptographic techniques, asymmitric cryptographic techniques, message authentication code techniques, public key certificate and public key infrastructure techniques, tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy, integrity for network communication data and authenticate the communication parties

    傳輸層協議( tls )和套接層協議( ssl )基於對稱密碼技術、非對稱密碼技術、消息認證碼技術、公鑰證書和公開密鑰基礎設施技術提供了保證通信據的機密性、完整性和對通信各方進行認證的機制。
  19. The paper aims at further research on the system of testing and evaluating network security with the sponsor of " the digital of fujian " - - the government information share platform of fujian province

    本文就是在「福建」福建省政務信息共享平臺項目的資助下,對測評系統展開研究的。
  20. Furthermore, in the second part, the author makes a deeply discussion and research on the design scheme of dalian tv station non - linear av editing network including the double - net framework, the digital compress technique, the virtual storage technique, the choices of digital compress format, the account of terminal stations, the manage functions and security of the system, etc. finally, in the third part, the author introduces the progress of non - linear av editing network in the future, showing the choices of compress format, software function, i / o interface, whole system of programming and broadcast, combining with internet and interactive tv, points out the direction of tomorrow tv technology system

    在此基礎上,隨后在文章第二部分對大連電視臺的非線性視音頻編輯建設從其核心技術與具體設計方案進行了詳細的闡述。其核心技術主要包括雙結構、壓縮技術、虛擬存儲技術等;具體設計方案則包括壓縮格式的選擇、站點的量及功能、系統的管理功能及性分析等幾個方面。文章的第三部分則主要通過壓縮格式選擇、軟體功能、上下載介面、制播一體化、與internet結合、交互電視等方面展開對電視臺非線性編輯的發展的論述,指出未來電視技術系統的發展方向。
分享友人