security architecture 中文意思是什麼

security architecture 解釋
安全體系架構
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • architecture : n. 1. 建築學。2. 建築(樣式、風格);建築物。3. 構造,結構;【自動化】(電子計算機的)架構,體系結構。
  1. The lesson to be drawn from the cfe treaty stalemate is that any element of global or european security architecture that is not based on the principles of equality and mutual benefit will not prove to be sustainable

    17 、發放給外國公民的居住證有效期應與證明其個人身份的文件相同,但不得超過5年。發放給無國籍人士的居住證有效期限為5年。
  2. ( 3 ) we propose a scalable grid security architecture

    ( 3 )提出了可擴展的安全體系結構。
  3. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機信息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。
  4. With the ground of information encryption technology, this paper analyzes network security architecture and makes deep research on user authentication on network application layer, especially on otp ( one - time password )

    本論文從網路安全體系結構分析入手,以信息加密技術為基礎,對網路應用層的身份認證技術,特別是一次性口令認證( otp )技術進行了深入研究。
  5. Research of cross - layer security architecture in wireless mesh networks

    無線網格網的跨層安全架構研究
  6. Identification card systems - inter - sector electronic purse - security architecture

    識別卡系統.部門間電子錢包.安全結構
  7. Together, the java 2 platform security architecture and jaas comprise the current java authorization model

    Java 2平臺安全體系結構和jaas共同構成了當前的java授權模型。
  8. Identification card systems - inter - sector electronic purse - part 2 : security architecture

    識別卡系統.內部電子錢包.第2部分:安全體系結構
  9. " a study and construction of sino - rail information system security architecture " is an important project initiated by the ministry of railway in 2002 - 2003

    「鐵路信息系統安全體系的研究和建設」項目是鐵道部2002 - 2003年度科技司立項的重點項目。
  10. The contents the article putted forward, such as model of knowledge management process, quantitative evaluation model, and the system structure, hierarchical structure and security architecture of knowledge management system, are of important indication and reference for enterprise to develop its knowledge management system based on e - collaboration. at the same time, it lays a foundation for the further research on knowledge management system based on e - collaboration

    本文提出的企業知識管理過程模型、量化評價模型,以及知識管理系統的體系結構、概要設計和安全體系等方面的內容,對企業開發基於電子協作的知識管理系統具有重要的指導意義和參考價值,並為進一步研究基於電子協作的知識管理奠定基礎。
  11. In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed

    本文對全國住房公積金監督管理信息系統網路安全體系進行設計,包括對物理安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與訪問控制和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。
  12. Financial transaction cards. security architecture of financial transaction systems using integrated circuit cards. secure application modules

    金融交易卡.集成電路卡財務交易系統的證券結構.安全應用模塊
  13. Financial transaction cards - security architecture of financial transaction systems using integrated circuit cards - part 7 : key management

    財務交易卡.集成電路卡金融交易系統的證券結構.第7部分:密鑰管理
  14. Financial transaction cards. security architecture of financial transaction systems using integrated circuit cards. part 1 : card life cycle

    財務交易卡.集成電路卡財務交易系統的安全結構.第1部分:卡壽命周期
  15. Financial transaction cards - security architecture of financial transaction systems using integrated circuit cards - transaction process

    財務交易卡.採用集成電路卡的財務交易系統的安全體系結構.第2部分:交易過程
  16. After reviewing the history of the security architecture of ip layer by introducing ipso, swipe and ipv6, the author has introduced and analyzed ipsec ( the de facto standard of ip security at present ) thoroughly, and then the author has listed the problems and flaws existed in ipsec. the author has pointed out that after adding compression process and changing the contents of authentication, we can use esp / tunnel mode only without the other three modes

    作者回顧了ip層安全體系結構研究的歷史,簡要介紹了ipso 、 swipe及ipv6 ,之後作者重點對ip層安全的事實標準ipsec進行了分析和評價,指出了它的優點及存在的問題和不足,作者提出了在對esp隧道模式增加壓縮並適當改變認證的內容之後,可以去掉其它三種模式而只保留此種模式的觀點。
  17. An industry colleague that frequently worked with us in support of our projects ( and vice versa ) on network and security architecture referenced them to us

    一位在網路和安全架構項目支持上經常與我們合作的同行向他們推薦了我們。
  18. At the core of what needs to happen to define a heterogeneous, incrementally implemented security architecture for web services will be standards

    為web服務定義一個異質的、漸增式實現安全架構所需的核心是標準。
  19. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  20. A research on sms and it ' s security architecture in the umts

    中的短消息業務及其安全機制研究
分享友人