security control key 中文意思是什麼

security control key 解釋
安全警惕按鈕
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. 3. in e - government security value orientation through the research government ' s organizational structure, the government movement process, withdraws the government activity which relatively stable role and the task as the key aspect for the access control

    3 .在電子政務安全的價值取向一節中通過研究政府的組織結構、政務的運行過程,提取政務活動中相對穩定的角色和任務作為訪問控制的關鍵因素。
  3. Cniec is engaged in project consultancy, project design, project labor security and hygiene pre - evaluation, project inspect and control, project survey, turn - key service, project management, petrologic engineeringconstruction, mechanical and electrical integration equipment development and manufacture, international trade and foreign economic and technological cooperation in such areas as mechanical, architecture, pharmaceutical and chemical, textile, civil architecture, military industry, power, electronic, building materials, and control over environmental pollution

    我公司主要在環境污染治理專項工程工業爐窯工程國外自備電站和輸變電工程機電設備產品的進出口貿易和施工監理方面為客戶提供從設計采購建造一體化的交鑰匙工程,同時可從事工程項目監理及代表業主從事工程建設項目的全過程管理。
  4. Article 16 for units with higher risk of fire disaster and units that may cause major casualties and deaths or heavy loss of assets in case of fire disaster, the public security fire control institutions of local people ' s governments above county level shall select these units as key units on fire control safety of their administrative region and file with the people ' s government of the same level for reference

    第十六條縣級以上地方各級人民政府公安機關消防機構應當將發生火災可能性較大以及一旦發生火災可能造成人身重大傷亡或者財產重大損失的單位,確定為本行政區域內的消防安全重點單位,報本級人民政府備案。
  5. But the key factor is its effective systematic arrangement such as the strict and standard administrative structure, the efficient organizational structure and the administrative system of the business expansion, which are the internal guarantee of the success of the businesses in the western investment bank. the strict administrative system of finance guarantees the mobility, the efficiency and the security of its assets ; the labor administration guarantees the source of the developmental energy for the bank which requires the knowledgeable labor ; the strict and scientific internal risk - control system guarantees the orderly development of the businesses in the western investment banks

    如,嚴謹規范的公司治理結構、運作高效的組織結構、內涵擴張的業務管理體系是西方投資銀行各項業務成功拓展的內在保障;嚴謹的財務管理體系確保其資產的流動性、效益性和安全性;人力資源管理是以知識密集型的投資銀行提供發展動力之源為宗旨;嚴密的內部風險控制體系以及科學的風險管理制度為投資銀行各項業務的有序開展提供了安全保障。
  6. This dissertation analyzes detailed research about some key technology and security policy, such as secure saving and getting between agents, secure communication between agents and hosts or agent proxy servers, mobile agent self - safe, safe transfer and control and timestamp, md5, dsa, identity authentication, digital signature etc. the insecure, single problems are resolved gradually, the whole safe framework needs to synthesize the consideration and form further

    由於很多安全問題之間也有相互制約,只能根據實際情況,找到最適合實際需要的安全策略。接下來對某些關鍵技術,諸如移動agent之間, agent與主機、代理服務器之間的安全存取資源,移動agent自身保護,安全地傳輸與控制,安全的通信,時間戳技術,消息摘要,數字簽名身份認證等安全策略,進行較詳細的剖析研究。
  7. The security environment of the router with ipsec is provided by the cooperation of access control system, key management system, audit system, security service strategy system, intelligent diagnosis system and ipsec implementation

    基於ipsec協議的路由器的安全保障由路由器中的訪問控制系統、密鑰管理系統、審計系統、安全服務策略系統、智能診斷系統以及ipsec實現共同提供。
  8. Secure access control mechanism is key technique that keeps security of subnet, and also the hotspot in the field of network security

    因此,安全的帶雙向認證的訪問控制機制已成為保證子網安全的核心,也是網路安全研究中的熱點。
  9. Key operational control on the direction of the game : eagle flight access to confidential documents will be sent to designated spots to score careful t encountered security

    游戲介紹:方向鍵操作控制鷹的飛行,取得機密文件后傳送到指定位置即可得分,小心不要碰到警衛!
  10. In the chapter of component based database access agent, the component criterion for the agent is selected and the component frame of the agent is designed based on the discussion for the component development technology. in the chapter of the platform of network communication, its operational principle is discussed at first, then the program structure of the platform and the key technology of encrypted network transmission is focused. in the chapter of the design and implementation of the server of the agent, the operational principle is researched, the program structure is designed, and the key technologies of database flux control, data buffer, and database security are studied

    基於組件的數據庫訪問代理設計介紹了組件開發技術、數據庫訪問代理的組件標準選擇及數據庫訪問代理的組件框架設計;網路通信平臺設計和實現研究了網路通信平臺的工作原理、實現過程中使用的基本技術,論述了網路加密傳輸關鍵技術,設計了網路通信平臺的程序結構;代理服務端設計和實現研究了代理服務端的工作原理,論述了數據庫流量控制和訪問優先級調度、數據緩沖及安全數據庫支持等關鍵技術,設計了代理服務端的程序結構;代理客戶端設計和實現研究了代理客戶端的工作原理,設計了代理客戶端的程序結構和組件介面。
  11. The whole system is divided into access and control of outlook express module, user interface module, security service embedding module, key and trust management module, provision of security service module and configuration module in this dissertation

    將整個安全電子郵件客戶端系統劃分為outlookexpress訪問控制模塊、用戶介面模塊、安全服務嵌入模塊、密鑰和信任管理模塊、以及安全服務提供模塊和系統配置模塊。
  12. This system ' s architecture is based on the advanced pki techniques and encryptions techniques, configured with indispensable hardware for security technology to form a substantial application security platform. this integrated application security platform provides the muti - platform applications systematical uniform security services, mainly including user ' s identification, confidentiality and integrity for data transmission, access control, user ' s digital sign and verification, cryptographic key management etc, to fulfill the trans - computer - type and trans - operation system control & management system, which is independent of different business applications or business procedures

    本設計方案以信息系統安全理論與系統工程學原理為基礎,在網路環境下構建了應用安全平臺,實現了一個跨硬體機型與操作系統臺的、與具體應用部署方式無關的統一的安全策略配置,實現了包括身份認證、訪問控制、數據機密性和完整性控制、應用密鑰管理服務、抗抵賴、安全審計、數據安全等安全服務。
  13. The encryption of public - key is an effective technology to complete the information security and visit control

    公鑰加密是完成信息保密性和訪問控制的有效技術。
  14. Object that specifies the access control security for the new key

    對象,為新項指定訪問控制安全性。
分享友人