企业和政策制定者必须克服这些关于隐私安全、数据访问、技术部署等问题的不对称诱因。
Companies and policy makers must also tackle misaligned incentives around issues such as privacy and security, access to data, and technology deployment.
安全问题涉及管理和技术手段,以避免损失和未授权的访问,破环,使用或者数据泄露。
Security involves both managerial and technical measures to protect against loss and the unauthorized access, destruction, use, or disclosure of the data.
更准确地说,安全性是一个过程,它应用多种技术来防止未经授权的用户(通常称为入侵者)对内容进行未经授权的访问。
More precisely, security is the process of applying various techniques to prevent unauthorized parties, known as intruders, from gaining unauthorized access.
DB 2产品系列软件和因特网技术的结合使我们可以方便地跨不同平台访问信息、使用信息并且保证信息安全。
DB2 product family software together with Internet technology makes information easily accessible, available, and secure across diverse platforms.
这种访问和通讯能力需要在极其巨大的广域通信网络最新被证明的安全技术的支持。
The access and communications capabilities require the latest in proven security technology for extremely large, wide-area communications networks.
因此,我们不能保证这些信息不可能被以违反我们的物理、技术或管理类安全措施的方式访问、披露、更改或破坏。
Therefore, we cannot guarantee that information may not be accessed, disclosed, altered, or destroyed by breach of any of our physical, technical, or managerial safeguards.
分布式数据库安全的核心技术是用户身份验证和访问控制。
The essential security technologies of the distributed database are user authentication and access control.
访问权限管理和数据加密是实现计算机数据安全的主要技术手段。
The main technical measures to keep computer data safe are user access management and data encryption.
访问控制是实现数据库安全的核心技术。
Access control is the central technology of the security of database.
本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制。
It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.
提出了一种基于组件技术的网格环境架构,并对其中的组件支撑环境、用户访问网关及安全管理等方面进行了详细描述。
This paper puts forward a grid architecture based on component technology, and gives detailed descriptions on the components support environment, user access gateway and security management.
随着信息技术在风力发电中的应用,风电场SCADA系统的安全访问控制变得越来越重要。
With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.
NET等技术,构建用户界面和对后端数据库的高效安全连接访问。
NET technique to set up the user interface, to create efficient and safe connection and access to the back-end database.
在系统开发、用户访问和安全设计等主要方面初步论证了管理信息系统的技术可行性。
Depending on the development of the system, visiting by the user and the safety design, it reasons the feasibility of the system.
它可以整合在访问控制、时间和考勤、报警管理、巡更、访客管理,视频监控、和其他安全技术。
It can integrate with access control, time and attendance, alarm management, guard tour, visitor management, video surveillance, and other security technologies.
访问控制是系统安全的重要技术。
Access control is an important technology in system security.
平台管理技术,数据安全技术和多用户并发访问技术。
Platform management technology, including data security technology and multi-user concurrent visit technology.
访问控制作为网络安全防范和保护的主要技术,主要任务是保证网络资源不被非法访问和使用。
The main purpose of Access Control, a major technique of network security prevention and protection, is to safeguard network resources from being illegally visited and used.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
开放式的架构系统,且与大约30个技术合作伙伴有着密切的合作,包括视频管理,访问控制和实体安全信息管理系统。
The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.
基于这一点,外汇市场系统网络安全访问控制技术显得更加重要。
On this point, the technology of network safe access control in the exchange transaction becomes more important.
身份认证是网络安全技术的一个重要组成部分,它限制非法用户访问网络资源。
Authentication is an important part in the network security. It can prevent illegal user from accessing network.
这些技术处理包括医疗提供者、病人、临床工作流程、安全、管理和信息设施等设计到关键互操作性信息的访问。
They address critical interoperability issuesrelated to information access for care providers and patients, clinicalworkflow, security, administration and information infrastructure.
本文从身份认证、访问控制等方面对信息安全的相关技术进行了分析和研究。
The thesis researches on the identity authentication and access control in information security technology.
访问控制是目前解决信息系统安全问题的主要技术。
Access control is a main technique to cope with the security problems in information systems.
通过实际应用来看,应用上下文技术可以用于提高细粒度访问控制的性能,从而提高数据库的安全性。
Application context can be useful for the purposes of enforcing fine-grained access control and enhances the security of database.
访问控制是普适计算安全的一项关键技术。
Access control is a key technique for the security of pervasive computing.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
文章提供了。NET框架安全性方面的概述,具体讲述基于角色的安全性、代码访问安全性、验证、堆栈审核、隔离存储、加密等方面的核心安全技术。
This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.
文章提供了。NET框架安全性方面的概述,具体讲述基于角色的安全性、代码访问安全性、验证、堆栈审核、隔离存储、加密等方面的核心安全技术。
This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.
应用推荐