Mobile
Log In Sign Up
Home > chinese-english > "完整性控制" in English

English translation for "完整性控制"

integrity control

Related Translations:
完整性:  integrity; integrality; wholeness; completeness; perfection
结晶完整性:  crystalline perfection
文件完整性:  file integrity
光学完整性:  optical perfection
资源完整性:  resource integrity
完整性检验:  completeness checkintegrity checking
完整性限制:  integrity constraint
动态完整性:  dynamic integrity
完整性子系统:  integrity subsystem
绝对完整性:  absolute completeness
Example Sentences:
1.Each part of the heterogeneous database has its own autonomy quality . at the time of realizing the data sharing , each database system have its own application characteristic , the integrality control and the security control still
异构数据库的各个组成部分具有自身的自治性,实现数据共享的同时,每个数据库系统仍保有自己的应用特性、完整性控制和安全性控制。
2.This subsystem adopts the oracle database , which can integrally manages data . the oracle database has features as follows : store a mass of data , define and operate the data , security control , integrity control , system resume , and so on
这一部分首先选用了具有完整的数据管理功能的oracle数据库,这些功能包括存储大量数据、定义和操纵数据、并发控制、安全性控制、完整性控制、故障恢复、与高级语言(如c , java等)接口等。
3.The blp model lays emphasis on the control of the secrecy , and the information transaction from high security level to lower level is controlled . however , the blp model lacks the control of the information integrity , unable to master the operation of " write up " " , and there are potential problems in the " write up " operation
Blp模型主要注重保密性控制,控制信息从高安全级传向低安全级,而缺少完整性控制,不能控制“向上写( writeup ) ”操作, “向上写”操作存在着潜在的问题。
4.This system ' s architecture is based on the advanced pki techniques and encryptions techniques , configured with indispensable hardware for security technology to form a substantial application security platform . this integrated application security platform provides the muti - platform applications systematical uniform security services , mainly including user ' s identification , confidentiality and integrity for data transmission , access control , user ' s digital sign and verification , cryptographic key management etc , to fulfill the trans - computer - type and trans - operation system control & management system , which is independent of different business applications or business procedures
本设计方案以信息系统安全理论与系统工程学原理为基础,在网络环境下构建了应用安全平台,实现了一个跨硬件机型与操作系统台的、与具体应用部署方式无关的统一的安全策略配置,实现了包括身份认证、访问控制、数据机密性和完整性控制、应用密钥管理服务、抗抵赖、安全审计、数据安全等安全服务。
5.According to some kinds of existed attacking methods that are aimed at the web system , the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol , and the related secure protocol standard . and focusing on cryptography , the paper lucubrates the technology of secure transmission of information such as data encryption , digital signature , identity authentication and data integrality technology
本文针对web系统中信息传输所面临的安全威胁,从保障网络信息安全传输的角度,系统研究了tcp ip各个层次上实现安全通道的可行性及相关的安全协议标准,围绕密码体制,对数据加密、数字签名、身份认证、数据完整性控制等信息安全传输技术进行了深入的探讨。
Similar Words:
"完整性检查" English translation, "完整性检查程序" English translation, "完整性检查工具" English translation, "完整性检查值" English translation, "完整性检验" English translation, "完整性控制功能" English translation, "完整性控制软件" English translation, "完整性模型" English translation, "完整性系数" English translation, "完整性限制" English translation