Mobile
Log In Sign Up
Home > english-chinese > "完整性控制" in Chinese

Chinese translation for "完整性控制"

integrity control

Related Translations:
完整性:  integrity; integrality; wholeness; completeness; perfection
结晶完整性:  crystalline perfection
文件完整性:  file integrity
光学完整性:  optical perfection
资源完整性:  resource integrity
完整性检验:  completeness checkintegrity checking
完整性限制:  integrity constraint
动态完整性:  dynamic integrity
完整性子系统:  integrity subsystem
绝对完整性:  absolute completeness
Example Sentences:
1.Each part of the heterogeneous database has its own autonomy quality . at the time of realizing the data sharing , each database system have its own application characteristic , the integrality control and the security control still
异构数据库的各个组成部分具有自身的自治性,实现数据共享的同时,每个数据库系统仍保有自己的应用特性、完整性控制和安全性控制。
2.This subsystem adopts the oracle database , which can integrally manages data . the oracle database has features as follows : store a mass of data , define and operate the data , security control , integrity control , system resume , and so on
这一部分首先选用了具有完整的数据管理功能的oracle数据库,这些功能包括存储大量数据、定义和操纵数据、并发控制、安全性控制、完整性控制、故障恢复、与高级语言(如c , java等)接口等。
3.The article points out the importance and necessity of the information - security from its actuality in our country . the resources in the information system , for instance , hardware , software , data , document , operator , meterial and so on , are evaluated and gived safety grade firstly . and then , it analyses the menace including the nonauthorized access , the information leak , the refused sevice , the internal objection which the system will take . the following are the corresponding control police : confirm the users " rights and duties , including the mode of using account , the limit of accessing resource , the application of password , the building of backup ; confirm the administrators " right and duties , including physical safety , system configuration , account configuration and usufruct , password management , audit and control , backup and individual intimity ; run - of - mill measure of security defence , including access control , symbol and identification , integrality control , password technique , firewall system , audit and resumption , safety of operating system , safety of database system , defence of computers " virus and resisting - deny protocol . in the end , the article offers the strategies of disposing the safety - accident and analyse after ithow . to report it , how to solve it in phase , and how to avoid it happening again . in a word , the article presents a holistic resolvent about keeping away the information system ' s security , and supplies a essential frame for its configuration , management and application
然后,对系统可能受到的威胁,包括非授权访问、信息泄漏、拒绝服务和内部缺陷等进行分析,并提出了相应的控制策略:确定用户的权力和责任,包括帐户使用方式、资源访问权限、口令应用以及建立备份等;确定系统管理员的权力和责任,包括物理安全、系统配置、帐户设置及使用权限、口令管理、审计和监控、备份以及个人隐私等方面;一般性的安全防护措施:存取控制、标识和认证、完整性控制、密码技术、防火墙系统、审计和恢复、操作系统安全、数据库系统安全、计算机病毒防护和抗抵赖协议等。最后,对事故处理和事后分析提供策略,如何报告安全事故,如何协调解决安全事故,如何避免安全事故再次发生。总之,本文对信息系统安全防范工作给出一个整体的解决方案,为其在配置、管理和应用方面提供了基本的框架。
4.The blp model lays emphasis on the control of the secrecy , and the information transaction from high security level to lower level is controlled . however , the blp model lacks the control of the information integrity , unable to master the operation of " write up " " , and there are potential problems in the " write up " operation
Blp模型主要注重保密性控制,控制信息从高安全级传向低安全级,而缺少完整性控制,不能控制“向上写( writeup ) ”操作, “向上写”操作存在着潜在的问题。
5.This system ' s architecture is based on the advanced pki techniques and encryptions techniques , configured with indispensable hardware for security technology to form a substantial application security platform . this integrated application security platform provides the muti - platform applications systematical uniform security services , mainly including user ' s identification , confidentiality and integrity for data transmission , access control , user ' s digital sign and verification , cryptographic key management etc , to fulfill the trans - computer - type and trans - operation system control & management system , which is independent of different business applications or business procedures
本设计方案以信息系统安全理论与系统工程学原理为基础,在网络环境下构建了应用安全平台,实现了一个跨硬件机型与操作系统台的、与具体应用部署方式无关的统一的安全策略配置,实现了包括身份认证、访问控制、数据机密性和完整性控制、应用密钥管理服务、抗抵赖、安全审计、数据安全等安全服务。
6.According to some kinds of existed attacking methods that are aimed at the web system , the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol , and the related secure protocol standard . and focusing on cryptography , the paper lucubrates the technology of secure transmission of information such as data encryption , digital signature , identity authentication and data integrality technology
本文针对web系统中信息传输所面临的安全威胁,从保障网络信息安全传输的角度,系统研究了tcp ip各个层次上实现安全通道的可行性及相关的安全协议标准,围绕密码体制,对数据加密、数字签名、身份认证、数据完整性控制等信息安全传输技术进行了深入的探讨。
Similar Words:
"完整性检查" Chinese translation, "完整性检查程序" Chinese translation, "完整性检查工具" Chinese translation, "完整性检查值" Chinese translation, "完整性检验" Chinese translation, "完整性控制功能" Chinese translation, "完整性控制软件" Chinese translation, "完整性模型" Chinese translation, "完整性系数" Chinese translation, "完整性限制" Chinese translation