• 形式化政策程序通常用于建立制度化网络安全程序

    Formalized policies and procedures are typically used to establish and institutionalize a cyber security program.

    youdao

  • 满足联锁软件黑箱测试要求,对联锁软件安全需求进行了分级形式化表达。

    To meet the requirements for black box testing of CISS (Computer Interlocking safety critical Software), the safety requirements of CISS are denoted hierarchically and formally.

    youdao

  • 最后想指出是,我们通过验证逻辑信息安全方面一些尝试研究,说明了形式化逻辑方法确实可以在这个领域上发挥重要作用

    Finally, through the attempt and research on verification logic in the field of information security, we point that formal logic method is sure playing a main role in it.

    youdao

  • 一个实用系统出发采用形式化证明方法,分析了电子资金转帐系统安全协议保密性可鉴别性。

    From an application system, this paper analyzes the privacy and authenticity of a security protocol in the electronic fund transfer system with a formal proof method.

    youdao

  • 提出一种新颖的形式化方法可以用于分析电子商务协议安全性质例如可追究性公平性

    A formal method which can be used to analyze security properties such as accountability and fairness in electronic commerce protocols is presented.

    youdao

  • 空间模型分析安全协议一种实用直观严格形式化方法

    Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.

    youdao

  • 事实证明,空间模型分析安全协议一种实用直观严格形式化方法

    In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.

    youdao

  • 然后对系统结构化要求进行了形式化描述,证明通过提出结构化方法可以获得安全进程环境

    Then we formalized structural requirements of process environment, and proved that a secure process environment can be available by structured method proposed.

    youdao

  • 设计一个满足安全需求协议非常困难,并且极易出错因此利用形式化方法检验安全协议引起了人们极大的关注

    Design of a protocol is a difficult and error-prone task, thus the use of formal methods that allow for the verification of such protocols has received increasing attention.

    youdao

  • 空间模型吸收前人研究成果,是分析安全协议一种实用直观严格形式化方法

    Having fully absorbed the former researching results, strand space model become a practical, intuitive and strict method for security protocols analysis.

    youdao

  • 是否具有形式化安全,是衡量密码体制是否安全重要的标准。

    While, the most important principle in evaluating a cryptosystem is whether it can be proved to be secure formally.

    youdao

  • 一些研究人员密码协议分析引入形式化方法通过建立形式模型自动检测工具分析密码协议的安全性,取得较大的成功。

    Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.

    youdao

  • 采用BAN认证逻辑协议安全进行形式化证明协议的计算复杂性进行了定性分析

    Then the formalized security proof of the protocol using BAN authentication logic, and the qualitative analysis about its computing complexity are given.

    youdao

  • 本文提出面向消息中间件的分布式认证协议给出协议内容形式化描述以及安全分析

    This chapter proposes a distributed authentication protocol for MOM , describes the content, the formalized description as well as the security analysis.

    youdao

  • 论文首先给出协议形式化描述然后讨论了协议安全、可鉴别性可验证性。

    This paper gives the formal description of the two-party protocol, and discusses the security, authenticability and verifiability for two-praty protocols.

    youdao

  • 密码协议必须满足安全属性的需求,对密码协议进行形式化规范需要证明其满足属性。

    The cryptographic protocol should always satisfy security properties, so the formal specification should give the corresponding proof method.

    youdao

  • 采用形式化方法分析安全协议协议分析有效手段近年来,出现了众多的研究方法

    Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.

    youdao

  • 安全模型安全系统开发基石形式化方法准确理解安全模型提供了保障依据。

    The security model is the cornerstone for developing the security operating system, while the formal method provides high level assurance for the understanding of the security model accurately.

    youdao

  • 本文提出了一种新的简单语义用于刻画协议部分安全性质,即只针对协议规约的单个主体,技术支持协议设计者安全性质进行形式化规约。

    This paper proposes a new simple trace semantics that can be used to specify security properties, this technique supports a protocol designer to provide formal analysis of the security properties.

    youdao

  • 其次我们分析网络环境下攻击模型考虑承诺方案应该具备的性质,并形式化定义公钥模型下承诺方案应该达到的安全属性。

    Next we consider the adversarial model in the Internet environment. We analyze properties that commitment schemes should have especially in the bare public key model and give a formal definition.

    youdao

  • 采用近世代数时序逻辑方法定义了形式化描述语言形式化描述密码协议分层安全需求

    Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols.

    youdao

  • 本文呈现我们构造形式化灰色时序安全策略规范语言GTSL)。 GTSL的理论基础灰色系统理论时序规范语言LO-TOS理论。

    The theory basis of GTSL is the theory of grey system and that of LOTOS, the language of temporal ordering specification.

    youdao

  • 通过建立协议理想化模型利用BAN逻辑形式化分析协议,在理论上证明安全

    After setting up the idealized protocol model, a process of formal analysis of this protocol is presented and the security is proved theoretically by using the BAN logic.

    youdao

  • 通过建立协议理想化模型利用BAN逻辑形式化分析协议,在理论上证明安全

    After setting up the idealized protocol model, a process of formal analysis of this protocol is presented and the security is proved theoretically by using the BAN logic.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定