查询词典 confidentiality
- 与 confidentiality 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
The site is located in the heart of Shaba Hotel zone in the east corner of the middle Haitang Bay in Hainan: it faces the South Sea and artificial island reef, possessing the excellent view of Wuzhizhou Island; to the east, it is near the fingerlike wetland, and the seafront landscape channel throughout the island provides good availability ; there is planned to be open space on the north and south sides, which offers unique confidentiality and exclusive enjoyment, and creates better sea view.
该项目基地位于海南海棠湾中部东隅沙坝酒店地带核心位置:东临南海及人造岛礁,拥有对蜈支洲岛优越的视线;西靠指状湿地,贯穿全岛的滨海景观道提供良好的可达性;南北两侧规划大尺度开放空间,为本项目提供了独特的私密与独享性,同时创造了更好的面海视野。
-
Journalists often talk about confidentiality when recounting stories that went journalistically rightWatergate being the classic example.
当谈论新闻原则正确的报道时,新闻工作者们经常提及保密问题,水门事件就是一个典型例子。
-
Upon the problems mentioned above, this paper focuses on the following work:? Analyzes the advantages and disadvantages for the key researches both in and abroad;? Studies some existing international standards and protocols including SET and ASC X9;? Gives the designing rules for the secure scheme then proposes a general simple model for mobile payment;? A secure scheme called SeMo is designed according to the different security needs for lineate links and wireless ones;? Analyzes the security for the scheme still basing on the two distinct links, which improves the scheme fully fulfilling the security requirements such as: authentication, integrity, confidentiality and non-repudiation.
针对上述问题,本文作了以下几点工作:●分析了国内外对移动支付研究的现有关键技术的优缺点;●学习了一些现有的国际金融规范和标准为准则;●借鉴安全电子交易模型方案,并参考了ASC的X9系列规范,提出一个简单可行的移动支付一般模型;●根据该模型尝试着根据无线和有线两个不同接口对安全性的需要,设计出移动支付系统的安全方案SeMo;●然后再根据接口的不同对该安全方案进行分析,证明该方案能解决移动支付的安全问题,也就是手持设备的认证问题以及数据保密性、完整性等问题。
-
Evaluation Information does not include, however, information that is or becomes generally available to the public other than as a result of a disclosure by Buyer or its Representatives, was available to Buyer on a nonconfidential basis prior to its disclosure by Seller or its Representatives, becomes available to Buyer on a nonconfidential basis from a person, other than Seller or its Representatives, who is not known by Buyer to be otherwise bound by a confidentiality agreement with Seller or to be otherwise under an obligation to Seller not to transmit the information to Buyer, or was independently developed by Buyer without reference to the Evaluation Information.
评估信息不包括,然而,信息供给或变得一般公众除由于透露之外由买家或它的代表,供给买家根据一个没有争议的事物。依据在它的透露之前由卖家或它的代表,变得可利用对买家根据一个没有争议的事物。依据从人,除卖主之外或它的代表,由卖家不知道由一个机密协议否则一定以卖主或有义务否则对卖主不传送信息给买家,或由买家独立地开发了没有在评估信息的参考。
-
In e-government IS includes five essential factors: availability, integrity, confidentiality, controllability and nonrepudiation, which are embodied in IS system model.
电子政务网络环境下的信息安全包括 5 个要素:可用性、保密性、完整性、可控性和不可抵赖性,这 5 个要素完全体现在信息安全的体系结构模型中。
-
The fundamental security requirements include confidentiality, authentication, data integrity, and nonrepudiation.
而其基本上的安全需求,包含有隐密性,可认证性,数据的完整性和不可否认性。
-
It provides the data commuication with integrity, confidentiality, authenticity and nonrepudiation. Consequently, secure network communication can be ensured by identifying the two parties involved in the communication.
数字签名为数据提供完整性、匿名性、身份识别和认证、以及不可否认性等安全服务,保证了网络中通信双方信息的安全传输。
-
Users' certificates are signed by CA and then respectively sent to each user to keep.The message and its digital signature are encrypted to transmit in the network without disclosure.The scheme proposed provides mutual authentication between the sender and the recipient,and the confidentiality,integrity and nonrepudiation of the interchanged messages are ensured.
通信的各方产生自己的私钥和公钥对,用户的证书由CA签发后交给用户保存,交换的消息和其签名等信息采用压缩加密传输,避免了消息在传输的过程中被第三者窃取或篡改,保证了数据的机密性、完整性和不可否认性。
-
After study security mechanism and several acess control model of operating system, compare the three odel, propose if combine the three model, it will be beneficial to confidentiality and integrity of Operating System.
介绍了操作系统的安全机制和几种访问控制模型,在对模型进行比较的基础上,提出采用多种模型相结合的方法,能够满足操作系统保密性与完整性要求。
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。