privacy system 中文意思是什麼

privacy system 解釋
保密通信制
  • privacy : n. 1. 隱退,隱避,隱居。2. 〈古語〉隱居處,隱退處。3. 秘密,私下。
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. The test model of random phasic signal and its application in the mobile privacy radio system

    隨機相位信號檢測模型及其在移動通信保密系統中的應用
  2. As a new generation of micro - satellite based on micro - electro - mechanic system ( mems ), pico - satellite, in virtue of its low weight ( 1kg or lighter ), is unburdened from high - cost large sending sets. thereby research of pico - satellite can be progressed with much lower cost without huge experimental establishments and wide - span workshops so that institutions, mostly universities, became the main researching force. besides reduced expenses, another advantage of research in university laboratories is the potential high privacy

    皮型衛星是新一代以mems技術為核心的微小衛星,由於質量很輕( 1kg以下) ,可不使用高成本的大型運載工具進行發射,其成本可比一般衛星大大降低;此外,皮型衛星的研製將不再需要大型的實驗設施和高跨度廠房,因此目前大學等研究機構是研製皮型衛星的主要科研力量,在大學的實驗室里研製皮型衛星,可以降低它們的研製費用。
  3. In addition, in conjunction with biometrics, use should be made where appropriate of so - called privacy enhancing technology. the use of such technology minimises the collection of personally - identifying data without compromising the power of biometrics to authenticate an individual s claim as an authorised user of a system or service

    此外,生物統計學亦應與稱之為加強私隱保障科技( " privacy - enhancingtechnology " )同時使用;應用此類科技,可減少收集可識辨個人身分的資料,但同時亦可發揮利用生物統計學精確辨別個人身分的功能的優點。
  4. Describe the weaknesses of your approach and how you would compromise privacy in your system if you were a medical knave

    如果你是一個醫學上的高手,請在你的系統中闡述你的方法的弱點和你是如何揭開秘密的。
  5. If your system slower and less efficient than before, ? a free tool that will help you solve this problem and protect your privacy

    如你的電腦比以前慢了,可試一下這個,可以清理檔案及保護私?的
  6. The system employs 128 - byte encryption [ c8 ], the same as banks, to ensure security and privacy

    和銀行加強安全和保密的措施一樣,這個系統也使用了128位元組的編密碼。
  7. With the development of electronic commerce, electronic cash system has become an unsubstitutable means because of the particular function protecting the payer and the payee ' s privacy

    隨著電子商務的發展,電子現金系統由於其獨特的保護支付者和接受者的個人隱私功能成為電子支付方式中一種不可替代的手段。
  8. Within a federated system, an organization needs a standardized and secure way of expressing not only the services it makes available to trusted partners and customers but also the policies by which it runs its business, such as which other organizations and users it trusts, what types of credentials and requests it accepts, and its privacy policies

    在聯合系統內,組織需要一種標準化並且安全的方式,用來陳述可以向受信任的合作夥伴和客戶提供的服務,以及企業的經營策略,如信任其他哪些組織和用戶接受的憑據和請求類型及隱私策略。
  9. Article 7 of the joint unit of exposure, the legal representative is at fault and who are directly responsible for the exposure was also at the same time, their photos and personal identification numbers from " ice8000 ? international credit supervision system state secrets, commercial secrets, personal privacy protection rules, " and will be external exposure, dishonest people to social awareness and avoid being taken

    第七條對單位聯合曝光的,法定代表人與有過錯的直接責任人也同時被聯合曝光,其照片和個人身份證號碼不受《 ice8000 ?國際信用監督體系國家秘密、商業秘密、個人隱私保護規則》的限制,將一併對外曝光,以便社會認識失信人,防止上當受騙。
  10. Mii experts participating in drafting the new system said that the system has included provisions to protect the privacy of personal information

    資訊產業部參與起草新制度細則的專家們說,手機實名制中還包括保護個人隱私的規定。
  11. By the research, it is put forward that our country at present stage should firstly modify the present law and rules to make preparation for making credit data known to the public, secondly should work out the regularized new law to use credit data as quick as possible, during modifying and working out the law, should pay attention to the scope to open regularized credit data to guarantee the fair and just of the credit investigation report of credit managing trade, and pay much attention to protecting personal right of privacy, meanwhile, should establish the punish system to those of breaking their promise

    通過研究提出,我國現階段應首先修改現行的法律法規為徵信數據公開做準備,其次應盡快出臺關於征信數據使用規范的新法案;在修改和制訂法律的過程中要注意規范信用數據公開的范圍、保證信用管理行業的資信調查報告的公平與公正性並注重保護個人的隱私權;同時應建立對失信者的懲罰機制。
  12. The full text contains four sections. the fundamental substance is as follows : in the first section, the thesis theoretically defines the right to privacy, the right to network and the characteristics of network privacy in the light of law, analyzes the difference between the right to privacy and the right to privacy in cyberspace. the second section introduces the protection system pattern of network privacy in the u. s. a, the european free trade association and the other country in the world, then give the evaluation

    本文首先對網路隱私權進行概括性的論述;其次對部分國家及地區對網路隱私權的保護模式進行介紹和評析;再次,通過分析我國網路隱私權保護現狀及存在的問題,結合我國的實際情況,選擇適合我國國情的網路隱私權保護模式;最後,對我國網路隱私權的立法保護體系進行構建,並提出其他的對策及建議。
  13. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加密系統,該系統將對稱加密演算法3des與非對稱加密演算法rsa相結合對數據加密,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加密、數字簽名、身份認證等功能,保證了發送方所發送信息的秘密性、鑒別性、完整性及不可否認性。
  14. This audit should encompass an assessment of the compliance measures taken by the credit reference agency to ensure it has written instructions and has disseminated privacy policy to operating staff regarding access procedures to the credit database, and effective safeguards to ensure system integrity complies with access procedures

    施,以確保該機構已制訂書面指示,並向操作人員派發查閱信貸資料庫的程序的私隱政策,及採取有效保障措施,以確保系統完整及依從查閱程序規定。
  15. This part put forward the system conception of kdd and the apriori algorithm. then evolved the create - frequent - set algorithm which was fit for the freight agent management system. because of the shortage of efficiency, 1 improved the algorithm. because some of the items were not boolean variables, 1 need the quantitaitve attributes association rules discovering algorithm. in general, there had the levels among the items, so multilevel association rules existed. after perfecting the algorithmic need interpret and evaluate the knowledge. in the end, 1 discussed the privacy and security of kdd. the fifth part described the future problems and prospect

    第四章是論文的主體,著重介紹知識發現的全過程,按照semma方法論首先進行數據準備,然後進入數據挖掘階段,提出知識發現的概念體系和公認的apriori演算法,從該演算法演變出適合於貨代管理系統的生成頻繁項目集的演算法;因為在實際應用中存在效率上的不足,因此進一步地提出了改進方案;在事務處理中各個項目並不都是布爾型變量,因此需要特定的針對多值屬性的關聯規則發現演算法;通常情況下,項目之間存在有層次關系,因此多層次關聯規則的發現普遍存在;演算法完善並運行后需要對發現的知識進行解釋和評估;本章的最後討論了知識發現的私有性和安全性問題;第五章講述有待解決的問題和發展前景。
  16. Privacy protection in system of private credit evidence

    個人信用徵信制度中的隱私權保護
  17. Jinjiang sansheng shoes material co., ltdwill be entitled to amend the information or terminate the service without any information to the users and also without any responsibilities for the users or the third parties. the amendment right of this statement belongs to jinjiang baisida clothing material co., ltd5. privacy system to respect the users personal privacy is one of our basic policies, so as a supplement to the above mentioned personal registration information, our company shall not publish the users registration information and the unpublicized content while without any authorization from the legal users unless there is legal permission

    C接受百絲達服裝材料有限公司不定時地向您的信箱發送信息如果用戶提供的資料不準確,百絲達服裝材料有限公司保留修改直至刪除任何虛假違法有損他人名譽和利益侵權的一切信息的權利和結束用戶使用百絲達服裝材料有限公司會員服務的權利,用戶同意此條款及同意接受百絲達服裝材料有限公司不時地對此條款所作的有關任何修改。
  18. The panza meeting is an annual gathering of privacy commissioners from australia, new zealand and hong kong to discuss and share views on privacy issues. mr. tang also made a presentation on the consultation on monitoring of employees at work in hong kong at the " privacy issues forum ", organized by the new zealand privacy commission on 28 march. delegates from the region attended to discuss the protection of privacy arising from public health system, genetics and surveillance

    三月二十八日,專員再出席由紐西蘭私隱專員公署舉辦的私隱議題論壇,就本港的監察活動及工作期間的個人資料私隱諮詢文件發表文章,並與來自亞太區的與會人士討論各項與私隱有關的議題,包括公眾健康系統、基因科技,以及監察活動。
  19. Exterior threats include the malicious code, denial of service, stealing and juggling data during transmission ; internal threats include privacy leakage, illegal access and modification. all these threats must be solved during the system construction

    外部威脅包括數據在傳輸中可能被竊取和篡改,惡意代碼,和拒絕服務( dos ) ;內部威脅包括了對系統代碼的竊取和修改,員工有意和無意的訪問、修改一些他們沒有權限訪問的數據。
  20. On the system of the right of privacy and its local construction

    論隱私權制度的本土化建構
分享友人