非完全信任 的英文怎麼說

中文拼音 [fēiwánquánxìnrèn]
非完全信任 英文
semi-trusted
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : 任名詞(姓氏) a surname
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括授權訪問、息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責,包括物理安、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安防護措施:存取控制、標識和認證、整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安、數據庫系統安、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安事故,如何協調解決安事故,如何避免安事故再次發生。總之,本文對息系統安防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. The main contributions of the second part of this dissertation are focused on the cryptographic properties of logical functions over finite field, with the help of the properties of trace functions, and that of p - polynomials, as well as the permutation theory over finite field : the new definition of chrestenson linear spectrum is given and the relation between the new chrestenson linear spectrum and the chrestenson cyclic spectrum is presented, followed by the inverse formula of logical function over finite field ; the distribution for linear structures of the logical functions over finite field is discussed and the complete construction of logical functions taking on all vectors as linear structures is suggested, which leads to the conception of the extended affine functions over finite field, whose cryptographic properties is similar to that of the affine functions over field gf ( 2 ) and prime field fp ; the relationship between the degeneration of logical functions and the linear structures, the degeneration of logical functions and the support of chrestenson spectrum, as well as the relation between the nonlinearity and the linear structures are discussed ; using the relation of the logical functions over finite field and the vector logical functions over its prime field, we reveal the relationship between the perfect nonlinear functions over finite field and the vector generalized bent functions over its prime field ; the existence or not of the perfect nonlinear functions with any variables over any finite fields is offered, and some methods are proposed to construct the perfect nonlinear functions by using the balanced p - polynomials over finite field

    重新定義了有限域上邏輯函數的chrestenson線性譜,考察了新定義的chrestenson線性譜和原來的chrestenson循環譜的關系,並利用一組對偶基給出了有限域上邏輯函數的反演公式;給出了有限域上隨機變量聯合分佈的分解式,並利用隨機變量聯合分佈的分解式對有限域上邏輯函數的密碼性質進行了研究;給出了有限域上邏輯函數與相應素域上向量邏輯函數的關系,探討了它們之間密碼性質的聯系,如平衡性,相關免疫性,擴散性,線性結構以及線性度等;討論了有限域上邏輯函數各類線性結構之間的關系,並給出了意點都是線性結構的邏輯函數的部構造,由此引出了有限域上的「泛仿射函數」的概念;考察了有限域上邏輯函數的退化性與線性結構的關系、退化性與chrestenson譜支集的關系;給出了有限域邏輯函數線性度的定義,利用有限域上邏輯函數的線性度與相應素域上向量邏輯函數線性度的關系,考察了有限域上邏輯函數的線性度與線性結構的關系;利用有限域上邏輯函數與相息工程大學博士學位論文應素域上向量邏輯函數的關系,揭示了有限域上的廣義bent函數與相應素域上的廣義bent函數的關系,以及有限域上的線性函數與相應素域上向量廣義bent函數之間的關系;給出了意有限域上意。
  3. Partial trust describes any zone that is not a full trust zone

    部分用於描述所有非完全信任的區域。
  4. In a partial - trust environment, a non - full trust assembly can only use transactions within the application domain in this case, the only resource being protected is system memory, unless it is granted the

    在部分的環境中,非完全信任程序集只能在應用程序域內使用事務(在此情況下,只有所保護的資源是系統內存) ,除向它授予
  5. Applications that receive less than full trust by the runtime code access security system are not allowed to call shared managed libraries unless the library writer specifically allows them to through the use of the

    不允許接收到低於級別(該級別是運行庫代碼訪問安系統授予的)的應用程序調用共享託管庫,除庫編寫器通過使用
分享友人