• 企业政策制定者必须克服这些关于隐私安全数据访问技术部署问题的不对称诱因

    Companies and policy makers must also tackle misaligned incentives around issues such as privacy and security, access to data, and technology deployment.

    youdao

  • 安全问题涉及管理技术手段避免损失未授权访问破环使用或者数据泄露

    Security involves both managerial and technical measures to protect against loss and the unauthorized access, destruction, use, or disclosure of the data.

    youdao

  • 准确地说安全一个过程,它应用多种技术防止未经授权的用户(通常称为入侵者)对内容进行未经授权的访问

    More precisely, security is the process of applying various techniques to prevent unauthorized parties, known as intruders, from gaining unauthorized access.

    youdao

  • DB 2产品系列软件因特网技术结合使我们可以方便地不同平台访问信息使用信息并且保证信息安全

    DB2 product family software together with Internet technology makes information easily accessible, available, and secure across diverse platforms.

    youdao

  • 这种访问通讯能力需要极其巨大广域通信网络最新被证明安全技术支持

    The access and communications capabilities require the latest in proven security technology for extremely large, wide-area communications networks.

    youdao

  • 因此我们不能保证这些信息可能违反我们物理技术管理类安全措施方式访问披露更改破坏

    Therefore, we cannot guarantee that information may not be accessed, disclosed, altered, or destroyed by breach of any of our physical, technical, or managerial safeguards.

    youdao

  • 分布式数据库安全核心技术用户身份验证访问控制

    The essential security technologies of the distributed database are user authentication and access control.

    youdao

  • 访问权限管理数据加密实现计算机数据安全主要技术手段

    The main technical measures to keep computer data safe are user access management and data encryption.

    youdao

  • 访问控制实现数据库安全核心技术

    Access control is the central technology of the security of database.

    youdao

  • 本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制

    It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.

    youdao

  • 提出一种基于组件技术网格环境架构其中的组件支撑环境用户访问网关安全管理等方面进行了详细描述

    This paper puts forward a grid architecture based on component technology, and gives detailed descriptions on the components support environment, user access gateway and security management.

    youdao

  • 随着信息技术风力发电中的应用风电场SCADA系统安全访问控制变得越来越重要

    With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.

    youdao

  • NET等技术构建用户界面数据库高效安全连接访问

    NET technique to set up the user interface, to create efficient and safe connection and access to the back-end database.

    youdao

  • 系统开发用户访问安全设计等主要方面初步论证管理信息系统技术可行性。

    Depending on the development of the system, visiting by the user and the safety design, it reasons the feasibility of the system.

    youdao

  • 可以整合访问控制时间考勤报警管理更、访客管理,视频监控、和其他安全技术

    It can integrate with access control, time and attendance, alarm management, guard tour, visitor management, video surveillance, and other security technologies.

    youdao

  • 访问控制系统安全重要技术

    Access control is an important technology in system security.

    youdao

  • 平台管理技术数据安全技术多用户并发访问技术

    Platform management technology, including data security technology and multi-user concurrent visit technology.

    youdao

  • 访问控制作为网络安全防范保护主要技术主要任务保证网络资源非法访问使用

    The main purpose of Access Control, a major technique of network security prevention and protection, is to safeguard network resources from being illegally visited and used.

    youdao

  • 基础上提出校园网安全方案重点介绍了网络访问控制端点安全保护、协议分析网络安全监控相关技术

    On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.

    youdao

  • 开放式架构系统,且大约30个技术合作伙伴有着密切的合作,包括视频管理访问控制实体安全信息管理系统。

    The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.

    youdao

  • 基于一点外汇市场系统网络安全访问控制技术显得更加重要

    On this point, the technology of network safe access control in the exchange transaction becomes more important.

    youdao

  • 身份认证网络安全技术一个重要组成部分限制非法用户访问网络资源。

    Authentication is an important part in the network security. It can prevent illegal user from accessing network.

    youdao

  • 这些技术处理包括医疗提供者病人临床工作流程安全管理信息设施等设计关键操作性信息的访问

    They address critical interoperability issuesrelated to information access for care providers and patients, clinicalworkflow, security, administration and information infrastructure.

    youdao

  • 本文身份认证访问控制等方面对信息安全的相关技术进行了分析研究

    The thesis researches on the identity authentication and access control in information security technology.

    youdao

  • 访问控制目前解决信息系统安全问题主要技术

    Access control is a main technique to cope with the security problems in information systems.

    youdao

  • 通过实际应用来看,应用上下文技术可以用于提高细粒度访问控制性能,从而提高数据库安全

    Application context can be useful for the purposes of enforcing fine-grained access control and enhances the security of database.

    youdao

  • 访问控制普适计算安全一项关键技术

    Access control is a key technique for the security of pervasive computing.

    youdao

  • 访问控制模型技术研究工作流系统安全机制核心,也是信息安全领域的一个热点问题。

    The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.

    youdao

  • 文章提供了NET框架安全方面概述具体讲述基于角色安全性、代码访问安全性、验证堆栈审核、隔离存储加密等方面的核心安全技术

    This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.

    youdao

  • 文章提供了NET框架安全方面概述具体讲述基于角色安全性、代码访问安全性、验证堆栈审核、隔离存储加密等方面的核心安全技术

    This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定