隱私策略 的英文怎麼說

中文拼音 [yǐnlüè]
隱私策略 英文
privacy policy
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
  • : Ⅰ名詞1 (通「冊」 古代寫字用的竹片或木片) bamboo or wooden slips used for writing on in ancient ...
  • : Ⅰ名詞1 (簡單扼要的敘述) summary; outline; brief account; résumé: 節略 memorandum; aide mémoire;...
  • 隱私 : 1. (隱蔽不外露) conceal; hide2. (秘密事) secret; one's secrets; private matters one wants to hide
  • 策略 : 1 (制定的行動方針和斗爭方式) tactics 2 (講究斗爭藝術) tactful 3 [數學] (對策) policy; strat...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. To deal with the question that how we can guarantee the dna sequences which are stored in the personal dna database are anonymous, that no one can find out whom a special dna sequence is collected from, this paper get a new method ? savior, by improve dnala ( dna lattice anonymization ), which is a method settling this question. savior replaces the multiple alignment in dnala with pairwise alignment between every tow sequences, and replaces the greedy algorithm in dnala with stochastic hill - climbing. for doing this, it can save the time for data pretreatment, and add the precision of classing

    針對個人dna數據的保護問題,即:如何保證無法將存儲在數據庫中的dna序列信息與其提供者的個人身份信息(如:姓名,身份證號碼等)聯系起來,本文對一種新近開發的保護方法? dnala ( dnalatticeanonymization )進行了改進,在數據預處理階段,用兩兩雙序列比對代替了原演算法中的多序列比對,在不降低處理精度的情況下減少了數據預處理所耗費的時間;用隨機爬山法代替了原演算法中的貪心,增加了演算法後期處理的精度,從而形成了一種新的演算法? savior 。
  3. Displays the microsoft privacy policy for online use

    顯示關于聯機使用的microsoft隱私策略
  4. Clause of personal secrets

    速之道隱私策略
  5. If you define a p3p privacy policy and place it in the root of your web site, more browsers will accept cookies from your site

    如果定義一個p3p隱私策略,並將其放置在網站的根目錄中,則更多的瀏覽器將接受您站點的cookie 。
  6. Program elements carrying annotation of these types can be captured by not only authorization and authentication aspects, but also other implementations such as privacy policy enforcement aspects

    包含這些類型的注釋的程序元素不僅能被授權和身份驗證方面所捕獲,而且還可被其他實現捕獲,比如隱私策略增強方面。
  7. While each jurisdiction has its own policy related to securing personal health information, every jurisdiction and its stakeholders must be able to trust that their requirements are satisfied with the most appropriate privacy enhancing strategies and technologies when placing or accessing information in the ehr

    每個區域醫療管理機構都有自己的相關政來獲取個人的健康信息,因此每個區域醫療管理機構及其利益相關者都需要確認,通過最合適的增強的隱私策略和技術,在存入和獲取ehr信息時, ,他們的要求能夠得到滿意的解決。
  8. Within a federated system, an organization needs a standardized and secure way of expressing not only the services it makes available to trusted partners and customers but also the policies by which it runs its business, such as which other organizations and users it trusts, what types of credentials and requests it accepts, and its privacy policies

    在聯合系統內,組織需要一種標準化並且安全的方式,用來陳述可以向受信任的合作夥伴和客戶提供的服務,以及企業的經營,如信任其他哪些組織和用戶接受的憑據和請求類型及隱私策略
  9. When it comes to privacy, your best strategy is to try to identify the most likely covert channels, and use them to your advantage by sending your potential attackers on a wild goose chase

    對于,您的最佳是嘗試找出看起來最秘密的通道,然後通過讓潛在攻擊者白費力氣來使用它們以獲得好處。
  10. The internet, hailed already by many as the catalyst for a second industrial revolution, is requiring that our traditional business models and strategies be recalibrated, " mr. stephen lau, privacy commissioner for personal data and chairman of the conference, said

    許多人早已視網際網路為第二次工業革命的催化劑,對之甚表歡迎,而傳統的商業模式及亦因而需要重新定位。個人資料專員及研討會主席劉嘉敏先生說。
  11. For the microsoft sql server privacy and data collection policy, see this

    有關microsoft sql server和數據收集的信息,請訪問此
  12. Rfid privacy security problem and strategy

    射頻識別技術中的安全問題及
分享友人