機密數據 的英文怎麼說

中文拼音 [shǔ]
機密數據 英文
confidential data
  • : machineengine
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 機密 : 1 (重要而秘密的) secret; classified; confidential; privacy 2 (機密的事)secret:泄漏機密divulge...
  • 數據 : data; record; information
  1. Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data

    在目前的技術條件下,保護和信息最行之有效的方法就是將它們加后再存儲在庫中,因為加了和信息,即使被竊取、被拷貝、被截獲,獲取者因無法破解竊取的文而無從知曉它們對應的機密數據
  2. Complete the design of application program and study the data processing algorithm on the ground of accurate diameter measure applying to small

    4 .進行了主應用程序的設計,並以超精小孔孔徑測量為背景進行了主后處理演算法的研究。
  3. This approach is recommended for reports that contain confidential data

    建議對包含機密數據的報表使用提示的憑這種方法。
  4. Confidential data include file and the control block used to manage the file transfer

    免受攻擊,機密數據包括文件以及管理文件傳送的控制塊。
  5. 13 hosoya h, pierce b c. xduce : a typed xml processing language. acm trans

    如果一個文檔並不包含機密數據,那麼這個文檔的cschema策略並不包含任何保護類型。
  6. The mobile agent might steal resources, confidential data or use the remote host as starting point for a new attack

    例如竊取主的資源、機密數據或利用此遠程主發起新的攻擊。
  7. Because report models can be quite extensive, you might want to secure the model items that map to confidential data

    因為報表模型可能非常大,您可能會需要為映射到機密數據的模型項設置安全性。
  8. Because the text entered is not encrypted in any way, you should treat it as you would any other confidential data

    因為輸入的文本未以任何方式進行加,所以您應該像處理任何其他機密數據一樣處理它。
  9. Because the clipboard can be accessed by other users, do not use it to store sensitive information, such as passwords or confidential data

    因為其他用戶可以訪問剪貼板,所以不要使用剪貼板存儲敏感信息,例如碼或機密數據
  10. Diskettes should be stored out of sight when not in use. if they contain highly sensitive or confidential data, they must be locked up

    當磁盤不在使用時應該儲存在看不見的地方。如果他們包含高度敏感或機密數據,必須存放在可上鎖的地方。
  11. In data security, the deduction of confidential data about a particular person by correlating released statistics about groups of individuals

    安全學中,用相關的已公開發表的個別小組的統計字推斷出特定人員的機密數據的推導過程。
  12. If a programming element represents proprietary functionality, or contains confidential data, you usually want to limit access to it as strictly as possible

    如果編程元素表示專有功能或包含機密數據,則通常需要盡最大可能嚴格限制對它的訪問。
  13. If your application creates intermediate files with confidential data, and those files might not get deleted if the application fails, then you should, at the minimum, document this potential problem in the operating instructions

    如果您的應用程序創建了一些含有機密數據的中間文件,而當應用程序運行失敗的時候,這些文件也許不會被刪除,那麼您應該至少在操作說明書中將這種潛在的問題記錄下來。
  14. In data security, the unauthorized searching of data held on a computer for information ( e. g. confidential data or proprietary software )

    技術中,未經許可而對保存在計算中的(例如機密數據或有專利權的軟體)進行搜索,以求獲取信息。
  15. This chapter introduces one technique which based on encrypting the access of storage data, this can be done by coding the phase of reference beams by use of orthogonal - phase - code

    介紹了一種基於對接入加通道進行加的方法,即對參考光的相位進行正交相位編碼; 4 .雙隨相位編碼加光存儲。
  16. In addition, a director must not make any unauthorized disclosure of confidential information, whether to co - trustees or to any other person ( even those to whom he owes a fiduciary duty ) whether to or make any use of such information for the advantage of himself or others

    此外,如未經許可,董事不得向共同受託人或任何其它人士(即使是該等董事須向其履行受信責任的人士)披露機密數據、或利用該等為其本人或其它人士謀取利益。
  17. Under internet entironment, data stored in database management system may be faced with unauthenticated disclosure, modification, counterfeit, broken, and so on. all these threat destroys the data ' s confidentiality. integrity, availability and facticity

    在internet環境下,庫管理系統中存儲的機密數據可能被非授權的泄露,纂改,中斷和偽造等。這破壞了的保性,完整性,可用性和真實性。
  18. In response to media enquiries on the disposal of data stored in personal computers of the inland revenue department, a government spokesman said that the government has stringent regulations governing the disposal of classified data stored in personal computers. all departments must completely clear all classified information before disposal so as to prevent recovery of the classified information

    政府發言人今日四月三十日回應傳媒查詢有關稅務局銷毀電腦資料事宜時表示,政府就銷毀機密數據的管理工作有既定規例,嚴格監管部門棄置電腦前,必須把電腦內的所有資料徹底清除,以防止該等資料被復原。
  19. Access policies specified by cschema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against cschema policies

    寫一個cschema策略類似於為xml文檔寫一個普通的schema ,區別是等碰到一個對應于機密數據的類型,這個類型應被改成一個保護類型。
  20. These released documents are then ready to be accessed by, for instance, xml query engines. by incorporating this validation procedure, other xml processing technologies can use cschema as the access control module

    一些xml處理語言,象cduce或者java ,也可把原始文檔轉換成可訪問的文檔,但是它們不能讓策略書寫員專注于機密數據,所以用它們來寫策略並不方便。
分享友人