Chinese translation for "完整性控制"
|
- integrity control
Related Translations:
完整性: integrity; integrality; wholeness; completeness; perfection 结晶完整性: crystalline perfection 光学完整性: optical perfection 资源完整性: resource integrity 完整性检验: completeness checkintegrity checking 完整性限制: integrity constraint 绝对完整性: absolute completeness
- Example Sentences:
| 1. | Each part of the heterogeneous database has its own autonomy quality . at the time of realizing the data sharing , each database system have its own application characteristic , the integrality control and the security control still 异构数据库的各个组成部分具有自身的自治性,实现数据共享的同时,每个数据库系统仍保有自己的应用特性、完整性控制和安全性控制。 | | 2. | This subsystem adopts the oracle database , which can integrally manages data . the oracle database has features as follows : store a mass of data , define and operate the data , security control , integrity control , system resume , and so on 这一部分首先选用了具有完整的数据管理功能的oracle数据库,这些功能包括存储大量数据、定义和操纵数据、并发控制、安全性控制、完整性控制、故障恢复、与高级语言(如c , java等)接口等。 | | 3. | The blp model lays emphasis on the control of the secrecy , and the information transaction from high security level to lower level is controlled . however , the blp model lacks the control of the information integrity , unable to master the operation of " write up " " , and there are potential problems in the " write up " operation Blp模型主要注重保密性控制,控制信息从高安全级传向低安全级,而缺少完整性控制,不能控制“向上写( writeup ) ”操作, “向上写”操作存在着潜在的问题。 | | 4. | This system ' s architecture is based on the advanced pki techniques and encryptions techniques , configured with indispensable hardware for security technology to form a substantial application security platform . this integrated application security platform provides the muti - platform applications systematical uniform security services , mainly including user ' s identification , confidentiality and integrity for data transmission , access control , user ' s digital sign and verification , cryptographic key management etc , to fulfill the trans - computer - type and trans - operation system control & management system , which is independent of different business applications or business procedures 本设计方案以信息系统安全理论与系统工程学原理为基础,在网络环境下构建了应用安全平台,实现了一个跨硬件机型与操作系统台的、与具体应用部署方式无关的统一的安全策略配置,实现了包括身份认证、访问控制、数据机密性和完整性控制、应用密钥管理服务、抗抵赖、安全审计、数据安全等安全服务。 | | 5. | According to some kinds of existed attacking methods that are aimed at the web system , the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol , and the related secure protocol standard . and focusing on cryptography , the paper lucubrates the technology of secure transmission of information such as data encryption , digital signature , identity authentication and data integrality technology 本文针对web系统中信息传输所面临的安全威胁,从保障网络信息安全传输的角度,系统研究了tcp ip各个层次上实现安全通道的可行性及相关的安全协议标准,围绕密码体制,对数据加密、数字签名、身份认证、数据完整性控制等信息安全传输技术进行了深入的探讨。 |
- Similar Words:
- "完整性检查" Chinese translation, "完整性检查程序" Chinese translation, "完整性检查工具" Chinese translation, "完整性检查值" Chinese translation, "完整性检验" Chinese translation, "完整性控制功能" Chinese translation, "完整性控制软件" Chinese translation, "完整性模型" Chinese translation, "完整性系数" Chinese translation, "完整性限制" Chinese translation
|
|
|