通用安全服務 的英文怎麼說
中文拼音 [tōngyòngānquánbìwù]
通用安全服務
英文
gss- 通 : 通量詞(用於動作)
- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 服 : 服量詞(用於中藥; 劑) dose
- 務 : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
- 通用 : be in common use; be current; apply or be used universally
- 服務 : give service to; be in the service of; serve
-
Using virtual servers, digital signatures on all os components, and a large number of read - only pieces in the os, strongbox is highly resistant to security breaches
通過使用虛擬服務器、所有os組件上的數字簽名以及os中大量的只讀部分, strongbox可以非常有力地防禦安全攻擊。Through the implementing of kernel level file and cache mechanism at the client side, this newly proposed distributed network file system provides seamless network file access and reduces the performance decline caused by network transmission. utilizing the concept of logic block server, it provides the reliable data block storage and implements redundant storage capacity. utilizing the concept of the index server, it provide s the cost of the greatly for server and network during data access process and realizes the computing with balancing capacity
在客戶端通過實現內核級文件的調用和緩沖機制,實現了文件的無縫網路存取,並減少由於網路傳輸帶來的性能下降的影響;利用邏輯塊服務器實現邏輯塊的冗餘存取,實現數據塊的安全存放;利用索引服務器進行負載均衡計算,實現資料存取的較低網路和服務器開銷;利用索引服務器實現服務器組的零管理,使該系統具有高效性、穩定性和可伸縮性。In the wcdma network, a variety of services and applications with the mobile station will be provided to us, such as the public safety service, vehicles and the traffic management, navigating, the city sightseeing etc, all of them must ascertain the accurate position of the moving station
在wcdma網路中,將提供多種與移動臺位置有關的服務和應用,如公共安全服務、車輛和交通管理、導航和城市觀光等。移動定位技術已成為wcdma網路的核心技術之一,對各種定位方法和技術在wcdma網路中的實施和應用已經成為目前研究的熱點。Afterwards, the paper investigates some key technologies including time delay, system security and data communication in system implementing and suggests that time delay problem could be solved through reducing the amount of data flow in the internet by using activex to encapsulate the client program by realizing communication between browser and client controlling program.
然後,論文對系統實施過程中的時延性、安全性和數據通信等關鍵性技術進行了研究,提出了採用activex技術來封裝客戶端程序,在瀏覽器中實現與控制服務程序的通信以減少網路數據量的方法來解決時間延遲的問題;以及採用安全套接字層協議ssl來解決安全性問題等的相應策略。The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago
本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。Services for frail casesthe integrated home care services teams ihcsts should address individual service users health concerns and corresponding needs by applying a multi - disciplinary approach including nursing care, personal care, rehabilitative service and social work service etc. a planned and well co - ordinated package of home care and community care service tailor - made for individual service user according to their frailty and disability. services for ordinary case including personal care simple nursing care service, general household or domestic duties, escort service child - minding, home respite service health safety, purchase and delivery of daily necessities, provision of meals and laundry service
A )傷殘及體弱個案:採用多專業的模式,針對體弱長者的需要,向他們提供護理、個人照顧、康復服務及社工服務等。服務隊會考慮服務使用者的受損或傷殘程度,為他們設計及提供一套有計劃及整全的家居及社區支援服務,包括,護理計劃、基本及特別護理、個人照顧、復康練習、護老者支援服務、暫托服務、 24小時緊急支援、家居環境安全評估及改善建議、家居照顧、膳食服務、交通及護送服務等。Later it came to include activities more precisely termed " web commerce " - - the purchase of goods and services over the world wide web via secure servers ( note https, a special server protocol which encrypts confidential ordering data for customer protection ) with e - shopping carts and with electronic pay services, like credit card payment authorizations
后來電子商務包括的活動更加精確地被命名為"網商務" - -物品購買和服務在萬維網通過安全服務器(一個特別的協議, https ,為保護顧客而編成的密碼機,它有著很機密的數據)這個服務器還有電子購物手推車和電子支付的服務,就好像信用卡被授權支付一樣Is security in the communications infrastructure acceptable, for example, in the use of secure socket layer mutual authentication between eai middleware servers, or in the use of the https protocol ? is individual, point - to - point security acceptable between participating systems, or is an end - to - end model required
是否可以接受通信基礎架構中的安全性,例如,是否在eai中間件服務器之間使用安全套接字層( secure socket layer , ssl )互相驗證,或者是否在使用https協議?The successful design of gsmb main board can not only establish theory and practice basis of designing server but also fill up the blank of no safety server based on domestic general cpu in our country in a long time. moreover, gsmb platform can provide north bridge, south bridge, soc ip core with a cross function hardware test circumstance, which can avail to develop chip groups of independent knowledge right, design all kinds of general cpu and high speed embedded cpu, strengthen market competitive ability, finish industrial develop of domestic cpu at an early date
Gsmb的開發成功,不僅為服務器主板設計積累了理論和實踐基礎,而且填補了我國長期沒有基於國產通用cpu的安全服務器的空白,更可以為研製北橋ipcore 、南橋ipcore 、 socipcore提供一個可進行交叉功能驗證的硬體平臺,以利於開發具有自主知識產權的晶元組、各種通用cpu和高速嵌入式cpu 、增強市場競爭力、早日完成國產cpu的產業化發展。And realizes the follow function in chognqing electronics government. realized the safety communications between the web server and the client using ssl ; realizes the safety e - mail system using certificate. bring upped the economic, credible resolvent for proving the status of object in network
並針對電子政務系統中的具體應用實現了:利用安全套接層協議( ssl )實現web服務器和客戶端瀏覽器之間安全通信;利用電子證書實現電子郵件安全傳;提出了比較經濟、可靠的分散式網路實體身份認證方式。This paper first introduced corba and corba security services specification ( csss ), analyzed the corba ' s security reference model and architecture, then adopted a ssl - based solution
本文參考corba安全服務規范,為orbit設計並實現包括用戶認證、訪問控制、審計、通信加密在內的安全服務。The design was based on the security reference model of csss, the architecture of which is a subset of the corba security architecture. lastly, the paper took large efforts to analyze the orb connection management, orb pseudo - object, object reference, and ior for orbit. based on the analysis, the paper implemented the ssl - based security service for orbit by modifying and complementing the orbit source.
提出設計之後,本文比較詳細地剖析了orbit中的連接管理、 orb偽對象、 orb初始化、對象引用、 ior ,在此基礎上對orbit源碼作了大量修改、補充,使之支持ssl的嵌入,最終實現通信加密、用戶認證、訪問控制和審計等安全服務。Koal software, supported by famous universities, colleges and scientific institutions, uniting well - known information security service providers, offers security integration, information system service, information security consultation and ca service. koal software establishes a credible, unitive and integral information security support system for e - government and e - commerce by introducing the concept and model of integrated security into informatization establishment
格爾軟體依託著名高校和科研機構,聯合知名信息安全服務商,為廣大用戶提供以整體安全集成、信息安全服務、信息安全咨詢、數字證書認證服務等為內容的信息系統整體安全建設與服務,通過把整體安全的概念、模型引入到信息化的建設中去,為電子政務、電子商務建立一個可靠的、統一的、完整的信息安全保障體系。Based on the above three - view framework, the thesis proposes a generic security architecture model for distributed information systems. this model is comprised of three parts as follows : the security service view model quality of security service ( qoss ) refers to the ability of a security system to satisfy the security service requirements of users. based on qoss, a security service view model is presented here, which includes variant security, strength of mechanism level ( sml ), adaptive security policy and so on
在三視圖框架的基礎上,本文進一步提出了一個通用的分散式信息系統安全體系結構模型,該模型主要分為以下三個部分:安全服務視圖模型本文提出了一個基於安全服務質量( qoss )的安全服務視圖模型,它包括可變安全、安全機制的強度級別( sml )和自適應的安全策略等方面的內容。The model is applied in ca / ra, it creates and manage storage and issues of pki key data. pki system is a common, safe and foundational institute. unsymmetrical code arithmetic principle and technology is applied into pki system and provided safety service
Pki系統是一個用非對稱密碼演算法原理和技術來實現並提供安全服務的具有通用性的安全基礎設施,它通過使用公開密鑰技術和數字證書來確保系統信息安全並負責驗證數字證書持有者身份的一種體系。According to the security demand of national information system of electronic government affairs, based on a wide - ranging investigation and survey on the structure, the manufacturing process and the security status of the communication business network of zhejiang province. the author used the theoretic knowledge of the security of information system and the engineering method. and then i analyzed the systemic security risk and security needs of the communication business network of zhejiang from the physics layer, network layer, system layer, application layer and administration layer respectively
論文作者參照國家對電子政務信息系統的安全要求,在對浙江省交通業務網的網路、業務流程和安全現狀進行了廣泛的調查了解的基礎上,運用信息系統安全的理論知識和工程方法,分別從物理層、網路層、系統層、應用層及管理層上對浙江省交通業務網系統進行了安全風險和安全需求分析,在此基礎上研究了安全技術和安全服務的配置原則和方法,設計出浙江省交通業務網的總體安全方案。Additionally, because of inherent cross - cutting characteristic of security service, we provide an aspect of security service by using the concept of aop, thus security - related code scattering and tangling can be avoided, and code reusability is also promoted at the same time
此外,由於安全服務的貫穿特性,通過使用aop思想對安全服務進行封裝,避免了安全相關代碼的散布和交織,同時也提高了代碼的復用率。In the layered model of communication protocols, ip layer is the lowest layer of likely realizing end - end security commnucation. the security mechanism based on the ip layer can offer security services to all applications and is the only security mechanism that can offer universal sercurity services
在通信協議的分層模型中, ip層是可能實現端到端安全傳輸的最底層,在ip層提供的安全機制可以為所有的應用提供安全服務,是唯一可以提供通用的安全服務的安全機制。The various authentication schemes include having users authenticated on the db2 udb server itself using the server s security facility, on the client allowing " single sign - on " access, a kerberos security facility, or a user - defined generic security service plug - in
有不同的身份驗證方案,包括讓用戶在db2 udb服務器上驗證(使用服務器的安全設施) 、在客戶機上驗證(允許「單點登錄」訪問) 、使用kerberos安全設施驗證,或者用戶定義的通用安全服務( generic security service , gss )插件驗證。In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management
筆者通過對石家莊市工商銀行中間業務現狀的分析,採用「安全攻擊路徑分析」和「安全威脅因素分析」方法對該行中間業務的安全威脅進行了詳細的分析,提出了適當的安全需求,採用多種安全設備如vpn設備、防火墻、 ids 、安全管理中心、安全內核、防病毒等,設計出了保護中間業務的技術安全防護方案,並提出了安全管理方面的措施建議,最後,給出了保證中間業務正常運行的安全服務方案。分享友人