完整性控制 meaning in Chinese
integrity control
Examples
- Each part of the heterogeneous database has its own autonomy quality . at the time of realizing the data sharing , each database system have its own application characteristic , the integrality control and the security control still
异构数据库的各个组成部分具有自身的自治性,实现数据共享的同时,每个数据库系统仍保有自己的应用特性、完整性控制和安全性控制。 - This subsystem adopts the oracle database , which can integrally manages data . the oracle database has features as follows : store a mass of data , define and operate the data , security control , integrity control , system resume , and so on
这一部分首先选用了具有完整的数据管理功能的oracle数据库,这些功能包括存储大量数据、定义和操纵数据、并发控制、安全性控制、完整性控制、故障恢复、与高级语言(如c , java等)接口等。 - The blp model lays emphasis on the control of the secrecy , and the information transaction from high security level to lower level is controlled . however , the blp model lacks the control of the information integrity , unable to master the operation of " write up " " , and there are potential problems in the " write up " operation
Blp模型主要注重保密性控制,控制信息从高安全级传向低安全级,而缺少完整性控制,不能控制“向上写( writeup ) ”操作, “向上写”操作存在着潜在的问题。 - This system ' s architecture is based on the advanced pki techniques and encryptions techniques , configured with indispensable hardware for security technology to form a substantial application security platform . this integrated application security platform provides the muti - platform applications systematical uniform security services , mainly including user ' s identification , confidentiality and integrity for data transmission , access control , user ' s digital sign and verification , cryptographic key management etc , to fulfill the trans - computer - type and trans - operation system control & management system , which is independent of different business applications or business procedures
本设计方案以信息系统安全理论与系统工程学原理为基础,在网络环境下构建了应用安全平台,实现了一个跨硬件机型与操作系统台的、与具体应用部署方式无关的统一的安全策略配置,实现了包括身份认证、访问控制、数据机密性和完整性控制、应用密钥管理服务、抗抵赖、安全审计、数据安全等安全服务。