機密數據 的英文怎麼說
中文拼音 [jīmìshǔjù]
機密數據
英文
confidential data- 機 : machineengine
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 數 : 數副詞(屢次) frequently; repeatedly
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 機密 : 1 (重要而秘密的) secret; classified; confidential; privacy 2 (機密的事)secret:泄漏機密divulge...
- 數據 : data; record; information
-
Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data
在目前的技術條件下,保護數據和信息最行之有效的方法就是將它們加密后再存儲在數據庫中,因為加了密的數據和信息,即使被竊取、被拷貝、被截獲,獲取者因無法破解竊取的密文而無從知曉它們對應的機密數據。Complete the design of application program and study the data processing algorithm on the ground of accurate diameter measure applying to small
4 .進行了主機應用程序的設計,並以超精密小孔孔徑測量為背景進行了主機上數據后處理演算法的研究。This approach is recommended for reports that contain confidential data
建議對包含機密數據的報表使用提示的憑據這種方法。Confidential data include file and the control block used to manage the file transfer
免受攻擊,機密數據包括文件以及管理文件傳送的控制塊。13 hosoya h, pierce b c. xduce : a typed xml processing language. acm trans
如果一個文檔並不包含機密數據,那麼這個文檔的cschema策略並不包含任何保護類型。The mobile agent might steal resources, confidential data or use the remote host as starting point for a new attack
例如竊取主機的資源、機密數據或利用此遠程主機發起新的攻擊。Because report models can be quite extensive, you might want to secure the model items that map to confidential data
因為報表模型可能非常大,您可能會需要為映射到機密數據的模型項設置安全性。Because the text entered is not encrypted in any way, you should treat it as you would any other confidential data
因為輸入的文本未以任何方式進行加密,所以您應該像處理任何其他機密數據一樣處理它。Because the clipboard can be accessed by other users, do not use it to store sensitive information, such as passwords or confidential data
因為其他用戶可以訪問剪貼板,所以不要使用剪貼板存儲敏感信息,例如密碼或機密數據。Diskettes should be stored out of sight when not in use. if they contain highly sensitive or confidential data, they must be locked up
當磁盤不在使用時應該儲存在看不見的地方。如果他們包含高度敏感或機密數據,必須存放在可上鎖的地方。In data security, the deduction of confidential data about a particular person by correlating released statistics about groups of individuals
在數據安全學中,用相關的已公開發表的個別小組的統計數字推斷出特定人員的機密數據的推導過程。If a programming element represents proprietary functionality, or contains confidential data, you usually want to limit access to it as strictly as possible
如果編程元素表示專有功能或包含機密數據,則通常需要盡最大可能嚴格限制對它的訪問。If your application creates intermediate files with confidential data, and those files might not get deleted if the application fails, then you should, at the minimum, document this potential problem in the operating instructions
如果您的應用程序創建了一些含有機密數據的中間文件,而當應用程序運行失敗的時候,這些文件也許不會被刪除,那麼您應該至少在操作說明書中將這種潛在的問題記錄下來。In data security, the unauthorized searching of data held on a computer for information ( e. g. confidential data or proprietary software )
在數據保密技術中,未經許可而對保存在計算機中的數據(例如機密數據或有專利權的軟體)進行搜索,以求獲取信息。This chapter introduces one technique which based on encrypting the access of storage data, this can be done by coding the phase of reference beams by use of orthogonal - phase - code
介紹了一種基於對接入加密數據通道進行加密的方法,即對參考光的相位進行正交相位編碼; 4 .雙隨機相位編碼加密光存儲。In addition, a director must not make any unauthorized disclosure of confidential information, whether to co - trustees or to any other person ( even those to whom he owes a fiduciary duty ) whether to or make any use of such information for the advantage of himself or others
此外,如未經許可,董事不得向共同受託人或任何其它人士(即使是該等董事須向其履行受信責任的人士)披露機密數據、或利用該等數據為其本人或其它人士謀取利益。Under internet entironment, data stored in database management system may be faced with unauthenticated disclosure, modification, counterfeit, broken, and so on. all these threat destroys the data ' s confidentiality. integrity, availability and facticity
在internet環境下,數據庫管理系統中存儲的機密數據可能被非授權的泄露,纂改,中斷和偽造等。這破壞了數據的保密性,完整性,可用性和真實性。In response to media enquiries on the disposal of data stored in personal computers of the inland revenue department, a government spokesman said that the government has stringent regulations governing the disposal of classified data stored in personal computers. all departments must completely clear all classified information before disposal so as to prevent recovery of the classified information
政府發言人今日四月三十日回應傳媒查詢有關稅務局銷毀電腦資料事宜時表示,政府就銷毀機密數據的管理工作有既定規例,嚴格監管部門棄置電腦前,必須把電腦內的所有機密資料徹底清除,以防止該等資料被復原。Access policies specified by cschema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against cschema policies
寫一個cschema策略類似於為xml文檔寫一個普通的schema ,區別是等碰到一個對應于機密數據的類型,這個類型應被改成一個保護類型。These released documents are then ready to be accessed by, for instance, xml query engines. by incorporating this validation procedure, other xml processing technologies can use cschema as the access control module
一些xml處理語言,象cduce或者java ,也可把原始文檔轉換成可訪問的文檔,但是它們不能讓策略書寫員專注于機密數據,所以用它們來寫策略並不方便。分享友人