Fully taking the characteristics of workflow management system into account, it works well to keep information secrecy, integrity and availability.
它充分考虑了工作流管理系统的特点,能够很好地保证信息的秘密性、完整性和可用性。
The IBIS model is used to help get exact information in the integrity constraint design of system board level or multiple board level signals for analysis and calculation.
IBIS模型可以帮助设计者在系统板级或多板信号完整性约束的设计中获取准确的信息,以进行分析和计算。
When the component of the protected system is attacked , intrusion tolerant technology can maintain integrity , confidentiality and usability of the whole system's key information and service .
当受保护系统的组件受到攻击时,入侵容忍技术能维持整个系统关键信息和服务的完整性、机密性和可用性。
So fieldwork platform have to load GIS and database system to come true integrity geologic information in spot.
因此,野外工作平台要求能够装载GIS和数据库系统软件,实现对野外地质信息进行现场的完整记录。
Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.
为实现信息系统的安全目标,需要系统能够提供相关的安全服务:身份标识与认证服务、授权与访问控制服务、非否认服务、机密性服务、完整性服务。
The Administer database function is responsible for maintaining the integrity of the data Management database, which contains both Descriptive information and system information.
管理数据库功能负责维持数据管理数据库的完整性,包括描述信息和系统信息的完整。
A secure network information system should ensure integrity, confidentiality and non-reputation of the transmitted data.
一个安全的网络信息系统应当确保所传输信息的完整性、保密性、不可否认性等。
By controlling the user's access to information and resource, access control ensures the confidentiality and integrity of system.
它通过控制用户对系统信息资源的访问,来达到系统信息资源的保密性和完整性。
After system of PKI is implemented integrity and accuracy, it can provide perfect information security assurance for protecting the sensitive correspondence and bargains.
当PKI系统被完整和正确地实现之后,就能够为保护敏感通信和交易提供完善的信息安全保证。
Exactly defining and strictly controlling the information channels between system modules or processes was beneficial to the integrity and controllability of the modules or processes.
明确描述和严格控制系统模块和进程之间的信息通道,有利于最大限度地保障模块或进程的完整性和可控性。
Finally, Combined with the design of database system, the paper discusses the data integrity, and does some design and research on system security through information security and network security.
最后论文结合数据库系统的设计,论述了数据完整性,从信息安全和网络安全两个方面对系统安全性进行了设计与研究。
The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.
对于信息系统的安全性一般包括:数据完整性、数据保密性、身份确认和认证、访问控制、不可否认性等几个方面。
Additionally, the system had other characters such as integrity of reputation information, non-repudiation, collusion-resisted and retaliation-resisted, which improved the usability of P2P networks.
此外,本体制还具有信誉信息的完整性、不可否认性、防合谋、防报复等特性,从而更好地提高对等网的可用性。
Making full use of integrity of 3D model information, the system automatically generates various kinds of 2D drawings and constructs the data model for structural analysis.
充分利用三维实体数据的完整性,实现各层次二维图形的自动生成和结构力学分析所需的数据模型的自动建立;
Making full use of integrity of 3D model information, the system automatically generates various kinds of 2D drawings and constructs the data model for structural analysis.
充分利用三维实体数据的完整性,实现各层次二维图形的自动生成和结构力学分析所需的数据模型的自动建立;
应用推荐