security architecture and design 中文意思是什麼

security architecture and design 解釋
安全體系結構和設計
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • architecture : n. 1. 建築學。2. 建築(樣式、風格);建築物。3. 構造,結構;【自動化】(電子計算機的)架構,體系結構。
  • and : n. 1. 附加條件。2. 〈常 pl. 〉附加細節。
  • design : vt 1 計劃,企圖,立意要…。2 指定,預定;留給,留著。3 設計,草擬,擬定,籌劃;起草,畫草圖,打(...
  1. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機信息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。
  2. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  3. Cniec is engaged in project consultancy, project design, project labor security and hygiene pre - evaluation, project inspect and control, project survey, turn - key service, project management, petrologic engineeringconstruction, mechanical and electrical integration equipment development and manufacture, international trade and foreign economic and technological cooperation in such areas as mechanical, architecture, pharmaceutical and chemical, textile, civil architecture, military industry, power, electronic, building materials, and control over environmental pollution

    我公司主要在環境污染治理專項工程工業爐窯工程國外自備電站和輸變電工程機電設備產品的進出口貿易和施工監理方面為客戶提供從設計采購建造一體化的交鑰匙工程,同時可從事工程項目監理及代表業主從事工程建設項目的全過程管理。
  4. There are some necessary introduction of the overall architecture, functions, performance, security design and implementations of the project in the dissertation

    論文還對計委證書中心的總體結構、功能、性能、安全設計與工程實施做了詳細介紹。
  5. Secondly, system design and architecture for network security part of practical project are introduced. finally, building scheme and implementation of ipsec security gateway and vpn system supported by linux operation system is put forward after ipsec protocol research and analysis

    其次介紹了四川省物價局縱向網網路工程中網路安全部分的體系設計及架構,最後通過研究和分析ipsec協議,提出了linux操作系統下ipsec安全網關和vpn系統的構建方案。
  6. Security design standard requires that architects must consider the environment ' s guarding against disasters and combine the saving life and security measure with architecture design perfectly, while designing cordial pleasant environment

    安全性設計標準要求建築師在設計親切宜人環境的同時,也必須考慮這種環境能最大限度地防禦災難,並將救生和安全措施與建築的美學設計天衣無縫的結合起來。
  7. In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed

    本文對全國住房公積金監督管理信息系統網路安全體系進行設計,包括對物理安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與訪問控制和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。
  8. In this article, skyler answers your questions about the architecture and design of ibm websphere portal hereafter called websphere portal applications, including hardware topologies and development and deployment architecture, security and single sign - on, content management and personalization, and generic websphere portal best practices

    在本文中, skyler回答了關于ibm websphere portal (以下稱為websphere portal )應用程序的架構與設計問題,包括硬體拓撲與開發和部署架構、安全與單點登錄、內容管理與個性化,以及一般websphere portal最佳實踐。
  9. This thesis has made thorough research to ipsec protocol architecture and esp protocol and ah protocol. it has proposed the design methods of realizing vpn security gateway based on ipsec protocol under linux, and has discussed in detail the implementation of esp protocol and ah protocol in tunnel mode, as well as the secure kernel improvements to ip protocol stack on linux vpn security gateway machine

    本文對ipsec的體系結構、 esp協議、 ah協議進行深入研究,提出了在linux上實現基於ipsec協議的vpn安全網關的設計方法,並討論了在隧道模式下esp協議和ah協議在linux上的的具體實施和對linuxvpn安全網關上內核ip協議棧的安全內核改造。
  10. ( 2 ) research on ipsec architecture the goal, function and construction of ipsec design ; the analysis on the two security protocols of ipsec ? ah and esp including security function, packet format, application mode and processing operations of each ; mainly of the security association ( sa ) and its two modes : transport and tunnel, the instrument on organizing and managing sas security association database ( sad ), and that on managing security policies ? ? security policy database ( spd ) ; specific descriptions on internet key exchange ( ike )

    ( 2 ) ipsec協議體系的研究給出了ipsec的設計目的、作用和組成;分析了ipsec的兩種安全協議? ? ah和esp ,包括每種協議的安全功能、包格式、應用模式以及對數據包的處理過程;重點研究了安全聯盟( sa )以及兩種模式:傳輸模式和隧道模式,組織和管理sa的手段? ?安全聯盟數據庫( sad ) ,以及安全策略的管理手段? ?安全策略數據庫( spd ) ;最後,對internet密鑰交換( ike )進行了詳細介紹。
  11. The security policy definition, the policy decision and the security policy executing mechanism are independent to each other, and it is the design principle of the new architecture

    新結構的基本思想是:將安全策略的定義、策略決定和策略執行機制相分離。
  12. Taking the research and development of integrated electronic commerce software gecis as background, this paper brings forward a framework model of form digital signature based on ssl protocol to provide higher security guarantee for ec. the whole task penetrates the developing process based on 3 - layer architecture. it uses architecture methods and technologies such as design pattern ect. moreover, it integrates uml and acme to establish software models

    本文以集成電子商務軟體gecis開發項目為背景,構造一個基於ssl協議的表單數字簽名軟體構架模型,為電子商務提供更高安全保障.整個研製工作貫穿基於三層體系結構的構件化軟體開發過程,運用設計模式等軟體體系結構方法和技術,綜合使用統一建模語言uml和體系結構描述語言acme建立軟體模型
  13. The paper begins with the introduction of the technical track and architecture of the target system, where basic concepts and technologies are covered ; and then, it goes through the implementation of automatic continuous integration using ant ; next, the concreate design and implementation details are discussed in three different charpters which corresponds to three different layers of the target system : persistent layer, business layer and presentation layer, some codes are analyzed with the help of uml diagrams ; finally, the system ’ s security framework “ accountsecure ” and the design

    本文首先從系統開發的技術路線和架構出發、分析,在整體上說明了構建目標系統所涉及的基本概念和技術;接著介紹了系統對自動化持續集成應用與實施;然後,本文按系統的功能層次劃分分別從持久層、業務層、顯示層三個層次討論了系統的具體的設計與實現,並結合uml圖分析了部分核心代碼;最後,本文介紹了系統的安全子框架「 accountsecure 」和作者總結的「 genericaccess 」設計模式。
  14. It has been playing an important role in equipping all kinds of arms and services for campaigns, tactical exercises and emergent actions etc. based on the detailed analysis of the exchange ' s architecture and implementing, this thesis points out some disadvantages of the device, such as too many absolute components, not very high enough reliability and security, very large size and weight, operating and maintaining difficultly. considering low power requirement and man - machine interface optimizing design at the same time, the thesis come up with an integrated design scheme to the previous device based on " mcu + cpld / fpga architecture " : ( 1 ) signal frequency dividing, timing frequency producing, 20 customers " led states controlling are implemented in cpld ; ( 2 ) decoding, latching data and controlling signals are implemented in cpld by bus interface between mcu and cpld ; ( 3 ) chip selecting principles and mcu idle mode design are completed under the consideration of low power requirement ; ( 4 ) operation by chinese lcd menus is adopted in the man - machine interface

    本項目以該交換機為研究對象,在詳細分析原設備的系統結構和功能實現方式的基礎上,指出該機型在使用過程中存在技術相對陳舊、分立元件過多、可靠性和保密性不夠、體積大、重量大、維修困難等問題,同時結合系統的低功耗需求和優化人機介面設計,本文提出基於「單片機+ cpld fpga體系結構」的集成化設計方案:在cpld中實現信號音分頻和計時頻率生成電路、 20路用戶led狀態控制電路; cpld與單片機以總線介面方式實現譯碼、數據和控制信號鎖存功能的vhdl設計;基於低功耗設計的器件選型方案和單片機待機模式設計;人機介面的lcd菜單操作方式。
  15. In the paper, the theory of access control 、 the concept of system call 、 the mechanism of loadable module and multiple security strategy framework - - gfac are introduced in emphasis. the paper also introduce particularly the architecture 、 function components 、 design and implementation of operating system firework and its each component " design and implementation

    論文重點介紹了訪問控制的理論、系統調用的概念、可卸載內核模塊的機制以及多安全策略支持框架gfac ;並詳細闡述了操作系統級防火墻的體系結構、各個功能模塊、設計與實現以及操作系統級防火墻各個組件的設計與實現。
  16. The design was based on the security reference model of csss, the architecture of which is a subset of the corba security architecture. lastly, the paper took large efforts to analyze the orb connection management, orb pseudo - object, object reference, and ior for orbit. based on the analysis, the paper implemented the ssl - based security service for orbit by modifying and complementing the orbit source.

    提出設計之後,本文比較詳細地剖析了orbit中的連接管理、 orb偽對象、 orb初始化、對象引用、 ior ,在此基礎上對orbit源碼作了大量修改、補充,使之支持ssl的嵌入,最終實現通信加密、用戶認證、訪問控制和審計等安全服務。
  17. Then architecture and design of bluetooth security are studied, and some advises on bluetooth security are also be set forth

    然後,研究了藍牙網路安全體系結構及其設計方法,對其存在的問題提出建議。
  18. With the scale of computer information system ( cis ) expanding and the security technology developing, a systematic and normalized computer information system security architecture ( cissa ) is needed to strengthen the design, development, implementation, evaluation and management of cissa. in order to normalize the build of cissa, and construct the security defense architecture in our country, a uniform cissa model and the implementary standard must be built

    隨著計算機信息系統規模的不斷擴大和信息安全技術的不斷發展,為了加強計算機信息系統安全體系的設計、開發、使用、評估和管理,需要對計算機信息系統安全體系進行系統化的認識和規范化的建設,因此必須建立統一的計算機信息系統安全體系模型和實施標準,規范計算機信息系統的安全體系建設,構築我國計算機信息系統安全防範體系。
  19. In light of security requirements analysis being a crucial step during the security architecture design process, the thesis first discusses two important issues in security requirements engineering, which are the categories and the analysis procedure of security requirements. here the security requirements are classified as two categories : functional security requirements and non - functional security requirements. also the security hazard analysis model and the security risk analysis model are presented, as well as the methods of security requirements specification and the corresponding improvements are introduced

    鑒于安全需求在安全體系結構設計中的重要地位,本文就安全需求工程中的兩個重要問題? ?安全需求的分類和安全需求的分析過程? ?進行了研究,給出了功能性安全需求和非功能性安全需求的分類方法,並對安全需求分析過程中的安全危險性分析、安全風險分析和安全需求描述的方法進行了討論。
  20. Then, from technique aspect, the article researches the construction of knowledge management system based on e - collaboration form its system structure, hierarchical structure, synoptic design, function design and security architecture. finally, the article designs and realizes knowledge community of knowledge management system, a system platform for communion and share of tacit knowledge

    然後從技術的角度,從體系結構、總體結構、概要設計、功能設計、安全體系等方面對基於電子協作的企業知識管理系統進行了研究,並設計和實現了知識管理系統中隱性知識交流和共享的平臺? ?知識社區。
分享友人