- 更多网络例句与机密性相关的网络例句 [注:此内容来源于网络,仅供参考]
-
To satisfy the demands of the data security, confidentiality and so on, several arithmetic schemes for data security are discussed.
针对数据在传输及存储过程中的机密性、完整性、可获取性、真实性和持久性的要求,探讨了安全方案。
-
DES, together with its ciphering algorithm, and basic theory of stream cipher are associated with, and the misled application of DES is also taken into account.
信息安全技术主要是研究计算机系统信息的机密性、完整性、可获取性和真实性,它的核心是加密技术。信息是一种资源,也是一种财富。
-
The objectives of security are to provide availability,integrity,and confidentiality protection to data and resources.
安全的目标是对数据和资源提供可用性,一致性和机密性的保护。
-
Finally, the theorems of data confidentiality and origin of confidential data are utilized to reanalyze NSPK protocol, the reason why the attack exists is explained.
最后,应用数据机密性和机密数据起源性定理,重新分析了NSPK协议,说明了其存在攻击的原因。
-
"I think it's driven by the individual agencies, which have bureaucratic sensitivities to protect," said Steven Aftergood of the Federation of American Scientists, editor of the online weekly Secrecy News."But it was clearly encouraged by the administration's overall embrace of secrecy."
&我认为是个别部门推动了该计划,它们总有官僚性的敏感去保护一些东西,&美国科学家联盟成员,网络周刊机密新闻的编辑斯蒂芬阿富特先生说道,&不过另一方面该计划因为行政部门对机密性的亲睐而受到鼓励,这是十分明显的。&
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
Users' certificates are signed by CA and then respectively sent to each user to keep.The message and its digital signature are encrypted to transmit in the network without disclosure.The scheme proposed provides mutual authentication between the sender and the recipient,and the confidentiality,integrity and nonrepudiation of the interchanged messages are ensured.
通信的各方产生自己的私钥和公钥对,用户的证书由CA签发后交给用户保存,交换的消息和其签名等信息采用压缩加密传输,避免了消息在传输的过程中被第三者窃取或篡改,保证了数据的机密性、完整性和不可否认性。
-
Elliptic Curve Signature Algorithmis used to provide unforgeability of user public key.
采用椭圆曲线签名算法保证用户自主生成公钥的不可伪造性,利用用户公钥生成的会话密钥以对称加密算法加密明文,保证明文的机密性,对明文空间的大小没有严格限制。
-
Proved the proposed scheme to be message confidentiality non-repudiation and unforgeability under the random oracle model.
在随机预言机模型下给出了该方案的安全性证明,证明结果表明该方案满足抗适应性选择密文攻击下的机密性、不可伪造性和不可否认性。
-
Keep the privacy and confidential of the information which have been consigned to us.
保护委托给我的信息的隐私性和机密性。
- 更多网络解释与机密性相关的网络解释 [注:此内容来源于网络,仅供参考]
-
Confidential submission:机密呈交
Confidential pre-filing review 呈报前机密性审核 | Confidential submission 机密呈交 | Confidentiality agreement 保密协议
-
Confidential submission:机密呈交来源:考试大
Confidential pre-filing review 呈报前机密性审核来源:考试大 | Confidential submission 机密呈交来源:考试大 | Confidentiality agreement 保密协议
-
Confidential submission:机密呈交来源:优习网
Confidential pre-filing review 呈报前机密性审核来源:优习网 | Confidential submission 机密呈交来源:优习网 | Confidentiality agreement 保密协议
-
confidentiality:机密性
机密 性(Confidentiality)完整性 (Integrity)可说明性 (Accountability)表1: 安全性特征 CORBA安全服务规范定义了不同的对象接口,这些接口提供了下面的安全功能来增强上面提及的安全性特征(见表2).
-
Confidentiality agreement:机密性协定
confidentiality 保密性,机密性 | confidentiality agreement 机密性协定 | configurated glass 压花玻璃
-
data confidentiality:资料机密性
在美国,接受联邦政府资助的大学都有一个"人类受试对象委员会",审查大学教师制定的研究方案是否有很大危险,如果有较大危险,就应当让研究对象填写"知情后同意表",这个表格的主要内容包括:(二)资料机密性原则资料机密性(data confidentiality)涉及对研究对象个人
-
data confidentiality:(数据机密性)
在本文中涉及的安全性的三个需求包括:(a)验证(authentication)、(b)数据完整性(data integrity)和(c)数据机密性(data confidentiality). 如果您对满足这些安全性需求的机制不熟悉,那么在深入探讨您可以如何实现它们zhiqian,我将简要地概述一下这些功能.
-
integrality:完整性
信息安全三要素指C.I.A特性,即机密性(Confidentiality)、完整性(Integrality)和可用性(Availability). 机密性表示只有被授权者才能使用特定数据资源;完整性表示只有被授权者才能修改特定数据;可用性表示用户能及时得到服务.
-
secrecy:保密性
机密性(Confidentiality) 保密性(secrecy),又称机密性,是指个人或团体的资讯不为其他不应获得者获得. 在电脑中,许多软体包括邮件软体、网路流览器等,都有保密性相关的设定,用以维护用户资讯的保密性,另外间谍档案或骇客有可能会造成保密性的问题.
-
Confidential List of Communication on the Status of Women:关于妇女地位的机密性来文一览表
confidential evaluation;机密评价;; | Confidential List of Communication on the Status of Women;关于妇女地位的机密性来文一览表;; | confidentiality of contracts;合同的保密性;;