• Based on our systemic model of information security, we design an electronic seal system.

    基于我们提出信息安全模型设计电子印章系统

    youdao

  • This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.

    文中介绍了信息融合概念功能模型以及安全审计系统组成功能

    youdao

  • Based on our systemic model of information security, we design and implement a secure E-government information system.

    基于我们提出信息安全模型设计实现了一个基于该模型的电子政务信息安全系统

    youdao

  • Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.

    数据完整性信息系统安全目标之一该文描述了一个时间相关数据库管理系统完整性策略模型

    youdao

  • PKI is the latest information security technology in the world, and trust model is very important in PKI system.

    PKI目前国际上研究最热信息安全技术信任模型PKI体系中占有重要地位。

    youdao

  • The information system based on this model can provide high-level security service.

    试验表明基于模型信息系统提供水平的安全服务

    youdao

  • The security model is the core content in the trusted information system and the key field of the trusted computing research.

    安全模型既是可信信息系统核心内容,也是可信计算研究重要领域

    youdao

  • The information security base are discussed, including security criteria, security expression model, system frame of the network security, some typical security technology.

    论述了信息安全基础:安全标准,安全表述模型网络安全体系结构几种典型安全技术。

    youdao

  • Security model need the feature attributes of the protected information system.

    安全模型必须考虑信息系统特征信息。

    youdao

  • Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.

    通过分析发现,利用攻击模型信息系统安全进行度量,比较好的选择最后对本模型的特点进行了讨论

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • Methods: security telemedicine system model was constructed with theoretic analysis according to each security request of medical information.

    方法针对医疗信息各项安全要求进行理论分析构建安全远程医疗系统模型结果

    youdao

  • Analyzed and discussed in this paper are two survivable system models based on information redundant partition technology-high reliability model and high security model.

    分析讨论基于信息分散的两种可存活系统模型——可靠和高安全模型

    youdao

  • Then, after SSE-CMM is explained, a risk-analysis-centric model of information system security engineering is established using system engineering theory.

    充分研究SSE CMM模型的基础上,采用系统工程思想建立了以风险分析为中心信息系统安全生命期模型。

    youdao

  • In view of resource particularity in wartime information systems of blood security organizations, binary system coding mode and coarse granularity parallel model were adopted.

    考虑血液保障组织系统系统资源特殊性编码方式采用二进制编码并行模型为粗粒度并行模型。

    youdao

  • So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.

    因此本文主要分为两个重要组成部分信息系统风险分析管理过程基于RBAC安全模型设计

    youdao

  • Being a new hot spot in the research of information security, the streaming media based information hiding is still lacking theoretical system model and standardization.

    媒体信息隐藏当前信息安全技术领域研究热点,但基于媒体的隐蔽通信技术缺少系统模型标准。

    youdao

  • Unit 2: This unit includes chapter 3 and chapter 4. The security model has been designed by the studies on the security of the data and information system.

    第二部分,通过数据信息系统安全探讨得出列车运行图信息系统的安全模型包括第三、

    youdao

  • Chapter 4 gives the security model of the TDIS by the studies on security strategies of information system.

    第四通过信息系统开发安全策略研究并结合第三章得到了列车运行图信息系统安全模型

    youdao

  • The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.

    网络拓扑主要采用DMZ管理区模式通过SSL认证系统加强网络信息安全防护。

    youdao

  • The model of the DMZ is adopted to manage the network topology and SSL authentication system is used to strengthen the security of the network information.

    网络拓扑主要采用DMZ管理区模式通过SSL认证系统加强网络信息安全防护。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定