通用安全服務 的英文怎麼說

中文拼音 [tōngyòngānquán]
通用安全服務 英文
gss
  • : 通量詞(用於動作)
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : 服量詞(用於中藥; 劑) dose
  • : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
  • 通用 : be in common use; be current; apply or be used universally
  • 服務 : give service to; be in the service of; serve
  1. Using virtual servers, digital signatures on all os components, and a large number of read - only pieces in the os, strongbox is highly resistant to security breaches

    過使虛擬器、所有os組件上的數字簽名以及os中大量的只讀部分, strongbox可以非常有力地防禦攻擊。
  2. Through the implementing of kernel level file and cache mechanism at the client side, this newly proposed distributed network file system provides seamless network file access and reduces the performance decline caused by network transmission. utilizing the concept of logic block server, it provides the reliable data block storage and implements redundant storage capacity. utilizing the concept of the index server, it provide s the cost of the greatly for server and network during data access process and realizes the computing with balancing capacity

    在客戶端過實現內核級文件的調和緩沖機制,實現了文件的無縫網路存取,並減少由於網路傳輸帶來的性能下降的影響;利邏輯塊器實現邏輯塊的冗餘存取,實現數據塊的存放;利索引器進行負載均衡計算,實現資料存取的較低網路和器開銷;利索引器實現器組的零管理,使該系統具有高效性、穩定性和可伸縮性。
  3. In the wcdma network, a variety of services and applications with the mobile station will be provided to us, such as the public safety service, vehicles and the traffic management, navigating, the city sightseeing etc, all of them must ascertain the accurate position of the moving station

    在wcdma網路中,將提供多種與移動臺位置有關的和應,如公共、車輛和交管理、導航和城市觀光等。移動定位技術已成為wcdma網路的核心技術之一,對各種定位方法和技術在wcdma網路中的實施和應已經成為目前研究的熱點。
  4. Afterwards, the paper investigates some key technologies including time delay, system security and data communication in system implementing and suggests that time delay problem could be solved through reducing the amount of data flow in the internet by using activex to encapsulate the client program by realizing communication between browser and client controlling program.

    然後,論文對系統實施過程中的時延性、性和數據信等關鍵性技術進行了研究,提出了採activex技術來封裝客戶端程序,在瀏覽器中實現與控制程序的信以減少網路數據量的方法來解決時間延遲的問題;以及採套接字層協議ssl來解決性問題等的相應策略。
  5. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利藍牙技術提供各種和實現的課題,並過一些具體實現的實例進行闡述,具體排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了的基礎知識,討論了osi系統中的四層網路結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  6. Services for frail casesthe integrated home care services teams ihcsts should address individual service users health concerns and corresponding needs by applying a multi - disciplinary approach including nursing care, personal care, rehabilitative service and social work service etc. a planned and well co - ordinated package of home care and community care service tailor - made for individual service user according to their frailty and disability. services for ordinary case including personal care simple nursing care service, general household or domestic duties, escort service child - minding, home respite service health safety, purchase and delivery of daily necessities, provision of meals and laundry service

    A )傷殘及體弱個案:採多專業的模式,針對體弱長者的需要,向他們提供護理、個人照顧、康復及社工等。隊會考慮使者的受損或傷殘程度,為他們設計及提供一套有計劃及整的家居及社區支援,包括,護理計劃、基本及特別護理、個人照顧、復康練習、護老者支援、暫托、 24小時緊急支援、家居環境評估及改善建議、家居照顧、膳食、交及護送等。
  7. Later it came to include activities more precisely termed " web commerce " - - the purchase of goods and services over the world wide web via secure servers ( note https, a special server protocol which encrypts confidential ordering data for customer protection ) with e - shopping carts and with electronic pay services, like credit card payment authorizations

    后來電子商包括的活動更加精確地被命名為"網商" - -物品購買和在萬維網器(一個特別的協議, https ,為保護顧客而編成的密碼機,它有著很機密的數據)這個器還有電子購物手推車和電子支付的,就好像信卡被授權支付一樣
  8. Is security in the communications infrastructure acceptable, for example, in the use of secure socket layer mutual authentication between eai middleware servers, or in the use of the https protocol ? is individual, point - to - point security acceptable between participating systems, or is an end - to - end model required

    是否可以接受信基礎架構中的性,例如,是否在eai中間件器之間使套接字層( secure socket layer , ssl )互相驗證,或者是否在使https協議?
  9. The successful design of gsmb main board can not only establish theory and practice basis of designing server but also fill up the blank of no safety server based on domestic general cpu in our country in a long time. moreover, gsmb platform can provide north bridge, south bridge, soc ip core with a cross function hardware test circumstance, which can avail to develop chip groups of independent knowledge right, design all kinds of general cpu and high speed embedded cpu, strengthen market competitive ability, finish industrial develop of domestic cpu at an early date

    Gsmb的開發成功,不僅為器主板設計積累了理論和實踐基礎,而且填補了我國長期沒有基於國產cpu的器的空白,更可以為研製北橋ipcore 、南橋ipcore 、 socipcore提供一個可進行交叉功能驗證的硬體平臺,以利於開發具有自主知識產權的晶元組、各種cpu和高速嵌入式cpu 、增強市場競爭力、早日完成國產cpu的產業化發展。
  10. And realizes the follow function in chognqing electronics government. realized the safety communications between the web server and the client using ssl ; realizes the safety e - mail system using certificate. bring upped the economic, credible resolvent for proving the status of object in network

    並針對電子政系統中的具體應實現了:利套接層協議( ssl )實現web器和客戶端瀏覽器之間信;利電子證書實現電子郵件傳;提出了比較經濟、可靠的分散式網路實體身份認證方式。
  11. This paper first introduced corba and corba security services specification ( csss ), analyzed the corba ' s security reference model and architecture, then adopted a ssl - based solution

    本文參考corba規范,為orbit設計並實現包括戶認證、訪問控制、審計、信加密在內的
  12. The design was based on the security reference model of csss, the architecture of which is a subset of the corba security architecture. lastly, the paper took large efforts to analyze the orb connection management, orb pseudo - object, object reference, and ior for orbit. based on the analysis, the paper implemented the ssl - based security service for orbit by modifying and complementing the orbit source.

    提出設計之後,本文比較詳細地剖析了orbit中的連接管理、 orb偽對象、 orb初始化、對象引、 ior ,在此基礎上對orbit源碼作了大量修改、補充,使之支持ssl的嵌入,最終實現信加密、戶認證、訪問控制和審計等
  13. Koal software, supported by famous universities, colleges and scientific institutions, uniting well - known information security service providers, offers security integration, information system service, information security consultation and ca service. koal software establishes a credible, unitive and integral information security support system for e - government and e - commerce by introducing the concept and model of integrated security into informatization establishment

    格爾軟體依託著名高校和科研機構,聯合知名信息商,為廣大戶提供以整體集成、信息、信息咨詢、數字證書認證等為內容的信息系統整體建設與過把整體的概念、模型引入到信息化的建設中去,為電子政、電子商建立一個可靠的、統一的、完整的信息保障體系。
  14. Based on the above three - view framework, the thesis proposes a generic security architecture model for distributed information systems. this model is comprised of three parts as follows : the security service view model quality of security service ( qoss ) refers to the ability of a security system to satisfy the security service requirements of users. based on qoss, a security service view model is presented here, which includes variant security, strength of mechanism level ( sml ), adaptive security policy and so on

    在三視圖框架的基礎上,本文進一步提出了一個的分散式信息系統體系結構模型,該模型主要分為以下三個部分:視圖模型本文提出了一個基於質量( qoss )的視圖模型,它包括可變機制的強度級別( sml )和自適應的策略等方面的內容。
  15. The model is applied in ca / ra, it creates and manage storage and issues of pki key data. pki system is a common, safe and foundational institute. unsymmetrical code arithmetic principle and technology is applied into pki system and provided safety service

    Pki系統是一個非對稱密碼演算法原理和技術來實現並提供的具有性的基礎設施,它過使公開密鑰技術和數字證書來確保系統信息並負責驗證數字證書持有者身份的一種體系。
  16. According to the security demand of national information system of electronic government affairs, based on a wide - ranging investigation and survey on the structure, the manufacturing process and the security status of the communication business network of zhejiang province. the author used the theoretic knowledge of the security of information system and the engineering method. and then i analyzed the systemic security risk and security needs of the communication business network of zhejiang from the physics layer, network layer, system layer, application layer and administration layer respectively

    論文作者參照國家對電子政信息系統的要求,在對浙江省交網的網路、業流程和現狀進行了廣泛的調查了解的基礎上,運信息系統的理論知識和工程方法,分別從物理層、網路層、系統層、應層及管理層上對浙江省交網系統進行了風險和需求分析,在此基礎上研究了技術和的配置原則和方法,設計出浙江省交網的總體方案。
  17. Additionally, because of inherent cross - cutting characteristic of security service, we provide an aspect of security service by using the concept of aop, thus security - related code scattering and tangling can be avoided, and code reusability is also promoted at the same time

    此外,由於的貫穿特性,過使aop思想對進行封裝,避免了相關代碼的散布和交織,同時也提高了代碼的復率。
  18. In the layered model of communication protocols, ip layer is the lowest layer of likely realizing end - end security commnucation. the security mechanism based on the ip layer can offer security services to all applications and is the only security mechanism that can offer universal sercurity services

    信協議的分層模型中, ip層是可能實現端到端傳輸的最底層,在ip層提供的機制可以為所有的應提供,是唯一可以提供機制。
  19. The various authentication schemes include having users authenticated on the db2 udb server itself using the server s security facility, on the client allowing " single sign - on " access, a kerberos security facility, or a user - defined generic security service plug - in

    有不同的身份驗證方案,包括讓戶在db2 udb器上驗證(使器的設施) 、在客戶機上驗證(允許「單點登錄」訪問) 、使kerberos設施驗證,或者戶定義的通用安全服務( generic security service , gss )插件驗證。
  20. In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management

    筆者過對石家莊市工商銀行中間業現狀的分析,採攻擊路徑分析」和「威脅因素分析」方法對該行中間業威脅進行了詳細的分析,提出了適當的需求,採多種設備如vpn設備、防火墻、 ids 、管理中心、內核、防病毒等,設計出了保護中間業的技術防護方案,並提出了管理方面的措施建議,最後,給出了保證中間業正常運行的方案。
分享友人