私人數據 的英文怎麼說

中文拼音 [rénshǔ]
私人數據 英文
private data
  • : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 私人 : 1. (個人的) private; personal 2. (自己的人) one's own man; personal friends or relatives
  • 數據 : data; record; information
  1. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,們通過計算機網路傳輸日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  2. Cable / satellite tv, hairdryer, in - room safe, internet access, iron and ironing board, mini bar, modem / data port connection, pay - per - view movies, private bathroom / ensuite, radio, telephone, television, voice mail

    空調,有線電視/衛星電視,風筒,安全室,上網,熨斗和燙衣板,迷你酒吧,機,計費電影,浴室/套房,電臺,電話,電視,留言
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. To deal with the question that how we can guarantee the dna sequences which are stored in the personal dna database are anonymous, that no one can find out whom a special dna sequence is collected from, this paper get a new method ? savior, by improve dnala ( dna lattice anonymization ), which is a method settling this question. savior replaces the multiple alignment in dnala with pairwise alignment between every tow sequences, and replaces the greedy algorithm in dnala with stochastic hill - climbing. for doing this, it can save the time for data pretreatment, and add the precision of classing

    針對個dna的隱保護問題,即:如何保證無法將存儲在庫中的dna序列信息與其提供者的個身份信息(如:姓名,身份證號碼等)聯系起來,本文對一種新近開發的隱保護方法? dnala ( dnalatticeanonymization )進行了改進,在預處理階段,用兩兩雙序列比對代替了原演算法中的多序列比對,在不降低處理精度的情況下減少了預處理所耗費的時間;用隨機爬山法代替了原演算法中的貪心策略,增加了演算法後期處理的精度,從而形成了一種新的演算法? savior 。
  5. Thispaperhasstudiedonthedatalinkinterfacetechniqueoftacticalcontrolsystem. firstof all, functional requirement and the important role of data link interface in tactical controlsystem is introduced ; secondly, with object oriented method, the characteristic of uav taskcontrol process is analysed, and then uav task control information model is established, anddata link interface standard of tactical control system is designed based on this model, including message format and transmission mechanism ; thirdly, data link control module isdesigned based on embedded linux operating system and has realized conversion betweendata link standard interface and the private interface of uav data link ; and then, combinationreal time corba middleware and its event channel, data link control modular componenttechnology is studied, and realization scheme is put forward ; finally, demostration is madebased on prototype of tactical controlsystem, which verify the validaty of data link interfacestandardandembeddeddatalinkcontrolmodules

    本文對戰術控制系統中的鏈介面技術進行研究:分析了鏈介面在戰術控制系統中的功能需求;採用面向對象的方法,分析無機任務控制問題,建立了無機任務控制信息模型,並基於該模型設計了鏈介面通信協議,包括報文格式和傳輸機制;基於嵌入式linux系統設計了鏈介面控制模塊,實現了鏈標準介面與無有介面之間的相互轉換;結合實時corba中間件及其事件通道,研究了鏈介面控制模塊組件技術,並給出了實現方案;通過戰術控制原理實驗系統的演示實驗,驗證了鏈介面通信協議和嵌入式鏈介面控制模塊的有效性。
  6. 7. to further enhance the transparency of this database of housing supply statistics, and to enable the public to have a clearer picture of the flat supply situation based on factual data, we will, with effect from 2005, start to release on a quarterly basis statistics on private housing supply in the primary market

    7 .為加強住宅樓宇供應統計字資料庫的透明度,並讓市民可以根實際更清楚了解房屋供應情況,本局將由二零零五年開始,每季發布有關住宅一手市場供應的統計字。
  7. For example, an intruder who is trying to retrieve proprietary data or customer databases probably should be combated much differently from an intruder who is trying to shut down a network

    比如說,對付一個正試圖檢索私人數據或客戶庫的入侵者和對付一個正試圖癱瘓網路的入侵者很可能要採取極不同的鬥法。
  8. Make a private mysql db public by randomizing sensitive information

    該軟體通過對敏感信息進行隨機處理,將一個私人數據庫公開。
  9. The analysis of laws protection to personal data privacy

    權的法律保護
  10. Significant opportunity costs include : litigation damages, loss of proprietary data, consumer confidence, loss of direct revenue, reconstruction of data, and reconstruction of services

    重要的機會成本主要包括:訴訟的賠償金,私人數據的丟失,消費者的信心,直接收入的丟失,重建,重建服務。
  11. Make sure you are not offering access to your private data at the same time

    確定你沒有在此時公布你的私人數據訪問信息。
  12. For example, a variable may contain a recordset with many rows of private data such as telephone numbers

    例如,變量可能包含由很多行私人數據(如電話號碼)組成的記錄集。
  13. You can have a single partition containing the entire operating system, applications, and your personal files

    您可以有一個包含整個操作系統,應用程序以及您私人數據的分區。
  14. This reduces the potential for an unwanted source to obtain the unique identifier in the url and use it to retrieve private user data stored in the session

    這降低了有害源獲取url中的唯一標識符並用它檢索存儲在會話中的用戶私人數據的風險。
  15. However, this centralization is risky for several reasons, not least of which is giving a third party total control over your access to services, and possibly your private data

    然而,由於種種原因這種集中非常危險,不僅是因為會使第三方完全控制您對服務的訪問,並且可能控制您的私人數據
  16. The two most important partitions to encrypt are : the home partition, where your private data resides, and the swap partition, where sensitive data might be stored temporarily during operation

    有兩個需要加密的重要分區: home分區,駐留您的私人數據,以及交換分區,敏感的在操作時會臨時保存在這里。
  17. If you have a fixed ip address, you give potential internet crackers all the time they need to search for entrances to your computer, and to store and share ( with other crackers ) information they might find about your unprotected private data

    如果你的ip地址固定,那麼會給網路黑客可乘之機,他們會通過專門的入口進入你的計算機,並且在你的計算機上保存信息或共享你未經保護的私人數據
  18. Define a password that you may use to protect your private data items

    定義保護私人數據項的密碼。
  19. Thery also protect the privacy of individuals against the misuse of personal data contained in records and archives

    他們還要保護個,防止文件和檔案中的個被濫用。
  20. Imagine that you leave your device somewhere and an unauthorized person will get access to your confidential data ! a worrying feeling, don ' t you think

    想象一下,你把你的手機落在某個地方,一個未經過你允許的將可以得到你的。一種令擔心的感覺,你不這么認為么?
分享友人