This paper constructed a security authentication mode in IP SAN, realized authentication in distributed data storage using SRP, and assured the security and integrity of data.
本文构建了一种SAN存储网络的安全认证模型,利用SRP机制实现了分布式数据存储的认证,有效地确保了数据的安全性和一致性。
It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.
它使用户能方便地进行定义和操纵数据,维护数据的安全性和完整性,以及多用户下的并发控制和恢复数据库等操作。
Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.
每个数据源必须有确定的管理人(业务角色)负责数据的精确性、完整性和安全性。
New principles for an age of big data sets will need to cover six broad areas: privacy, security, retention, processing, ownership and the integrity of information.
对于大数据集时代的新原则需涵盖以下六个广泛的领域:隐私、安全、产权保持力、处理、拥有和信息的完整性。
While virtual desktops require network connectivity to function, you cannot overlook the security, mobility, and data integrity benefits of such a strategy.
尽管虚拟桌面需要网络连接才能工作,但是这种战略在安全性、可移动性和数据完整性方面具有很强的优势。
It provides simple and efficient access to XML with the same levels of security, integrity, and resiliency taken for granted with relational data.
它提供了对XML的简单高效的访问,并为相关数据提供了相同的安全性、完整性和弹性。
It also includes the management objective of internal audit, which includes not only the audit IS protection of asset security and data integrity, but also the effectiveness of IS.
又包括内部审计的管理目标—即不仅包括被审计IS保护资产安全及数据完整,且包括IS的有效性目标。
In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.
哈希算法在信息安全领域主要应用于验证数据完整性和签名认证。
The former request for data to build a strong speech and integrity, a good library of data security.
对于前者要求建立起数据一致辞性和完整性强、数据安全性好的库。
Information security not only includes guaranteeing the security of locally stored data, but also the confidentiality and integrity of data in the process of communication.
信息安全除了保证数据在本地存储过程中的安全,还应该满足其在网络传输过程中的保密性和完整性要求。
To improve the security performance of DSP system, a novel security mechanism is designed, combining two security methods: AES bus encryption and data integrity checking.
为了提高DSP系统的安全性能,结合AES总线加密和数据完整性检测两种安全方式,设计了一种新的安全机制。
Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.
数据完整性和合法存取会受到很多方面的安全威胁,包括密码策略、系统后门、数据库操作以及本身的安全方案。
DHI has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement.
兹证明,DHI符合安全港隐私原则中通知、选择、转送、安全、数据完整性、访问和执行的要求。
At the same time, the software deals with the real-time data by the means of memory database and USES the thread security class to maintain the data's integrity.
同时,对系统中大量实时数据则采用内存数据库管理方式,并利用线程安全类来保证读取数据的完整性。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
Digital signature has been playing a very important role in the fields of information security, identity authentication, data integrity, nonrepudiation and anonymity, etc.
数字签名已经在信息安全、身份认证、数据完整性、不可否认性以及匿名性等方面发挥了重要作用。
The air interface security technologies for the protection of data confidentiality and data integrity in 3g are discussed.
讨论了第3代移动通信系统的空中接口安全保护技术,包括数据机密性保护、数据完整性保护。
The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.
对于信息系统的安全性一般包括:数据完整性、数据保密性、身份确认和认证、访问控制、不可否认性等几个方面。
The development mainly includes the establishment of strong data integrity, security, good database and fully functional, beautiful and easy to use foreground applications.
开发主要包括建立数据完整性强、安全性好的数据库和功能完备、美观易使用的前台应用程序。
The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.
数字签名技术在身份认证、数据完整性等方面具有其它技术所无法替代的作用,在信息安全领域得到广泛的应用。
Security is one of the key factors in Grid environment. The Grid security include data integrity, data privacy, authentication, authorization and audit.
安全性是网格环境中的关键因素之一,网格的安全性主要包括数据的一致性、私有性、认证、授权与审计。
Finally, Combined with the design of database system, the paper discusses the data integrity, and does some design and research on system security through information security and network security.
最后论文结合数据库系统的设计,论述了数据完整性,从信息安全和网络安全两个方面对系统安全性进行了设计与研究。
With regard to the former requirements of a database consistency and integrity strong, good for data security.
对于前者要求建立起数据库一致性和完整性强,数据安全性好的库。
The improved OTA security system ensures transmission security, data integrity, management security effectively, and meets the need of the security properties of the authentication and anti-denial.
该方案增强了现有OTA下载系统的安全性,有效保障了OTA无线下载服务的传输安全性、数据完整性和系统的安全,改进了系统的身份认证和抗抵赖性等安全性能。
For the former require the establishment of strong data consistency and integrity, data security, a good library, and the latter requires the application of the full-featured, easy to use and so on.
对于前者要求建立起数据一致性和完整性强、数据安全性好的库,而对于后者则要求应用程序的功能完备、易使用等特点。
This security protocol can effectively protect the integrity of the data, protect data keep from bluff it, and prevent heavy hair attack, etc.
此安全协议能够有效保护数据完整性、保护信息的不可抵赖、防止重发攻击等。
This security protocol can effectively protect the integrity of the data, protect data keep from bluff it, and prevent heavy hair attack, etc.
此安全协议能够有效保护数据完整性、保护信息的不可抵赖、防止重发攻击等。
应用推荐