全数字全息术以光学原理为其理论基础,与计算机强大的处理能力相结合,应用于信息安全领域。
The all-digital holography is based on the optical theory, combined with the strong manipulated ability of the computer, which is applied to the information security fields.
现代密码学理论和密码技术是信息安全的重要基础。
Modem cryptological theory and cryptological technology are important basis of information security.
将IFS理论引入信息安全领域,提出一种基于直觉模糊推理的入侵检测方法。
The paper brings the theory of IFS into the field of information security and proposes a technique for intrusion detection based on intuitionistic fuzzy reasoning.
以危机管理理论为基础的风险预警则是通过收集已辨识评价的风险因子信息的状态,来预警企业的安全生产状况。
Risk forewarning, based on crisis management theory, is to gather information status of the identified and evaluated risk factors, and to warn the enterprises of their production safety status.
身份识别和认证以及数字签名技术是现有的安全理论中保证网络环境下信息安全传输的有力手段。
Identification recognition, authentication and digital signature are strong methods of available security theories to secure safe transmission in network environment.
论文第一部分(1-4章)较系统完整地搭建了信息安全的理论基础框架;
Part 1 (Chapter 1 - 4) establishes theoretic basic framework of Information Security in systematically and integrally.
现代密码学理论和密码技术是信息安全的重要基础。
Modern cryptological theory and cryptological technology are important basis of information security.
在信息融合技术与可拓学理论的基础上,提出了一种新的井采煤矿安全性态评价模型。
On the basis of information fusion technology and extension theory, a new assessment model of underground coal mines safety behavior was proposed.
已提出的信息系统安全评估的准则和标准在理论结构上还不成熟,而且可操作性不强。
Evaluation of having bought forward Information security rules is not mature in theory and not strong at maneuverability.
在该理论研究的指导下,以煤矿安全监察管理信息系统为例,给出了系统全部建模过程。
Under the guidance of the theory research, taking Coal Safety Supervise Management Information system for instance, giving the whole modeling process of the system.
主要研究方向:计算机网络与信息安全理论与技术、并行计算等。
Research Fields: the Theory and Technique of Computer network and Information Security; Parallel Computing etc.
文章从消息层次上讨论了信息安全问题,重点介绍了信息理论密码学与复杂性理论密码学。
This paper discusses on the problem of information security from message level, and introduces emphatically information theory based cryptology and complexity theory based cryptology.
安全进程代数可以作为信息流安全的基础理论框架。
Security Process Algebra forms a basis for secure information flow theory.
从水印的通信模型建立,水印的相关检测模型,到信息隐藏容量分析,隐写术的安全性理论,详细介绍了水印的相关理论;
Theories related to watermark are introduced in detail, including communication model, related detection model, hiding information capacity analysis and security of steganography.
本文论述了建立物资管理信息网络系统的全过程,内容涉及物资管理理论、数据库与应用软件的设计与实现算法、网络构建及安全等方面的问题。
The thesis dissertate whole process at building information and network system, including 5 aspects: material manage theory, computer database, application procedure, network and safe.
本文从理论上研究了RBAC的概念模型,并与传统的安全访问控制相比较,论证了在企业信息系统中采用RBAC的必要性。
We analyze RBAC concept model, compare it with traditional access control scheme, and demonstrate the necessity of implement RBAC in Enterprise Information Systems.
方法针对医疗信息的各项安全要求进行理论分析,构建安全远程医疗系统模型结果。
Methods: security telemedicine system model was constructed with theoretic analysis according to each security request of medical information.
对信息安全风险评估和系统风险的整体评价进行了理论归纳。
The risk evaluation of information security and system risk synthetical assessment method was also theoretically concluded.
理论上可以满足井下所有信息传输的需要,特别适合于煤矿安全生产,对煤矿井下的运用有一定的参考价值。
It can theoretically meet the transmission of all underground information and is specially suitable for safe production in coal mines.
文章在安全进程代数理论框架内讨论信息流安全模型。
A process algebraic approach to the modelling of information flow security is explained.
《数据库与安全》是计算机学院网络与信息安全专业的主干课之一,由数据库理论与技术和数据库安全两个方面构成。
As one of the backbone courses for Network and Information security major, the course of database and security comprises database theory and technology, database security.
网络攻击效果评估理论和方法研究在信息系统的安全评估过程中具有深刻的理论指导意义和重要的应用价值。
The evaluation theory and method of the attack effect of networks are very important and significant in information systems.
本文将信息过滤技术应用到安全审计的内容审计中,对于完善安全审计系统具有很高的理论指导作用。
In this paper, the information filtering technology is applied in content auditing, which will play a very important role on consummating theoretical direction of the safety audit system.
本文将煤矿的安全生产信息和GIS电子地图信息相结合,为管理者提供一个形式多样化的信息管理平台,是对矿山GIS的建设在理论和方法上的探索与尝试。
The paper provides a diversified forms of information management platform by binding of GIS and mines safety production information. Thus it's a exploring and attempting in mine construction of GIS.
本文将煤矿的安全生产信息和GIS电子地图信息相结合,为管理者提供一个形式多样化的信息管理平台,是对矿山GIS的建设在理论和方法上的探索与尝试。
The paper provides a diversified forms of information management platform by binding of GIS and mines safety production information. Thus it's a exploring and attempting in mine construction of GIS.
应用推荐