• Fully taking the characteristics of workflow management system into account, it works well to keep information secrecy, integrity and availability.

    它充分考虑工作流管理系统特点能够很好保证信息秘密性完整性可用性

    youdao

  • The IBIS model is used to help get exact information in the integrity constraint design of system board level or multiple board level signals for analysis and calculation.

    IBIS模型可以帮助设计者系统信号完整性约束设计获取准确信息进行分析计算

    youdao

  • When the component of the protected system is attacked , intrusion tolerant technology can maintain integrity , confidentiality and usability of the whole system's key information and service .

    受保护系统组件受到攻击时,入侵容忍技术维持整个系统关键信息服务的完整性机密性可用性。

    youdao

  • So fieldwork platform have to load GIS and database system to come true integrity geologic information in spot.

    因此野外工作平台要求能够装载GIS数据库系统软件,实现对野外地质信息进行现场完整记录。

    youdao

  • Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.

    实现信息系统安全目标,需要系统能够提供相关安全服务身份标识认证服务、授权访问控制服务、非否认服务、机密性服务、完整性服务。

    youdao

  • The Administer database function is responsible for maintaining the integrity of the data Management database, which contains both Descriptive information and system information.

    管理数据库功能负责维持数据管理数据库完整性包括描述信息系统信息完整。

    youdao

  • A secure network information system should ensure integrity, confidentiality and non-reputation of the transmitted data.

    一个安全网络信息系统应当确保所传输信息的完整性保密性、不可否认性等。

    youdao

  • By controlling the user's access to information and resource, access control ensures the confidentiality and integrity of system.

    它通过控制用户系统信息资源访问,来达到系统信息资源保密性完整性

    youdao

  • After system of PKI is implemented integrity and accuracy, it can provide perfect information security assurance for protecting the sensitive correspondence and bargains.

    PKI系统完整正确地实现之后,能够保护敏感通信交易提供完善的信息安全保证

    youdao

  • Exactly defining and strictly controlling the information channels between system modules or processes was beneficial to the integrity and controllability of the modules or processes.

    明确描述严格控制系统模块和进程之间信息通道有利于最大限度地保障模块进程完整性可控性

    youdao

  • Finally, Combined with the design of database system, the paper discusses the data integrity, and does some design and research on system security through information security and network security.

    最后论文结合数据库系统设计论述数据完整性信息安全和网络安全两个方面系统安全性进行了设计研究

    youdao

  • The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.

    对于信息系统安全性一般包括:数据完整性、数据保密性、身份确认认证、访问控制不可否认性等几个方面。

    youdao

  • Additionally, the system had other characters such as integrity of reputation information, non-repudiation, collusion-resisted and retaliation-resisted, which improved the usability of P2P networks.

    此外,本体制具有信誉信息完整性不可否认性、防合谋、防报复特性从而更好地提高对等可用性

    youdao

  • Making full use of integrity of 3D model information, the system automatically generates various kinds of 2D drawings and constructs the data model for structural analysis.

    充分利用实体数据完整性实现层次图形的自动生成结构力学分析所需数据模型的自动建立

    youdao

  • Making full use of integrity of 3D model information, the system automatically generates various kinds of 2D drawings and constructs the data model for structural analysis.

    充分利用实体数据完整性实现层次图形的自动生成结构力学分析所需数据模型的自动建立

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定