• This paper constructed a security authentication mode in IP SAN, realized authentication in distributed data storage using SRP, and assured the security and integrity of data.

    本文构建了一种SAN存储网络的安全认证模型利用SRP机制实现了分布式数据存储的认证,有效确保了数据安全性一致性

    youdao

  • It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.

    使用户方便地进行定义操纵数据维护数据安全性完整性以及用户并发控制恢复数据库等操作。

    youdao

  • Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.

    每个数据源必须确定管理人业务角色负责数据精确性完整性安全性

    youdao

  • New principles for an age of big data sets will need to cover six broad areas: privacy, security, retention, processing, ownership and the integrity of information.

    对于数据时代原则涵盖以下六个广泛领域隐私安全产权保持力处理拥有信息完整性

    youdao

  • While virtual desktops require network connectivity to function, you cannot overlook the security, mobility, and data integrity benefits of such a strategy.

    尽管虚拟桌面需要网络连接才能工作,但是这种战略安全性、可移动性数据完整性方面具有很强优势

    youdao

  • It provides simple and efficient access to XML with the same levels of security, integrity, and resiliency taken for granted with relational data.

    提供XML简单高效访问相关数据提供了相同安全性完整性弹性

    youdao

  • It also includes the management objective of internal audit, which includes not only the audit IS protection of asset security and data integrity, but also the effectiveness of IS.

    包括内部审计管理目标不仅包括被审计IS保护资产安全数据完整,且包括IS的有效性目标。

    youdao

  • In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.

    算法信息安全领域主要应用验证数据完整性签名认证。

    youdao

  • The former request for data to build a strong speech and integrity, a good library of data security.

    对于前者要求建立数据致辞性完整性、数据安全性好的

    youdao

  • Information security not only includes guaranteeing the security of locally stored data, but also the confidentiality and integrity of data in the process of communication.

    信息安全除了保证数据在本地存储过程中的安全,应该满足网络传输过程中的保密性完整性要求。

    youdao

  • To improve the security performance of DSP system, a novel security mechanism is designed, combining two security methods: AES bus encryption and data integrity checking.

    为了提高DSP系统安全性能结合AES总线加密数据完整性检测两种安全方式设计了一种新的安全机制

    youdao

  • Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.

    数据完整性合法存取受到很多方面安全威胁包括密码策略系统后门数据库操作以及本身安全方案

    youdao

  • DHI has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement.

    证明DHI符合安全隐私原则通知选择转送安全数据完整性访问执行的要求。

    youdao

  • At the same time, the software deals with the real-time data by the means of memory database and USES the thread security class to maintain the data's integrity.

    同时系统大量实时数据采用内存数据库管理方式利用线程安全保证读取数据完整性。

    youdao

  • In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.

    可信计算平台维护过程中,需要保证保护数据完整性安全性可用性。

    youdao

  • Digital signature has been playing a very important role in the fields of information security, identity authentication, data integrity, nonrepudiation and anonymity, etc.

    数字签名已经信息安全身份认证数据完整性、不可否认性以及匿名性等方面发挥重要作用

    youdao

  • The air interface security technologies for the protection of data confidentiality and data integrity in 3g are discussed.

    讨论了第3移动通信系统空中接口安全保护技术,包括数据机密性保护、数据完整性保护。

    youdao

  • The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.

    对于信息系统安全性一般包括:数据完整性、数据保密性、身份确认认证、访问控制不可否认性等几个方面。

    youdao

  • The development mainly includes the establishment of strong data integrity, security, good database and fully functional, beautiful and easy to use foreground applications.

    开发主要包括建立数据完整性安全性好的数据库功能完备、美观使用前台应用程序

    youdao

  • The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.

    数字签名技术身份认证、数据完整性等方面具有其它技术无法替代作用,在信息安全领域得到广泛的应用

    youdao

  • Security is one of the key factors in Grid environment. The Grid security include data integrity, data privacy, authentication, authorization and audit.

    安全性网格环境中的关键因素之一,网格安全性主要包括数据一致性私有性认证授权审计

    youdao

  • Finally, Combined with the design of database system, the paper discusses the data integrity, and does some design and research on system security through information security and network security.

    最后论文结合数据库系统设计论述数据完整性信息安全和网络安全两个方面系统安全性进行了设计研究

    youdao

  • With regard to the former requirements of a database consistency and integrity strong, good for data security.

    对于前者要求建立起数据库一致性完整性数据安全性好的库。

    youdao

  • The improved OTA security system ensures transmission security, data integrity, management security effectively, and meets the need of the security properties of the authentication and anti-denial.

    方案增强了现有OTA下载系统安全性有效保障了OTA无线下载服务传输安全性、数据完整性系统安全,改进了系统的身份认证和抗抵赖等安全性能。

    youdao

  • For the former require the establishment of strong data consistency and integrity, data security, a good library, and the latter requires the application of the full-featured, easy to use and so on.

    对于前者要求建立数据一致性完整性、数据安全性好的对于后者要求应用程序功能完备、使用等特点。

    youdao

  • This security protocol can effectively protect the integrity of the data, protect data keep from bluff it, and prevent heavy hair attack, etc.

    安全协议能够有效保护数据完整性、保护信息不可抵赖防止攻击

    youdao

  • This security protocol can effectively protect the integrity of the data, protect data keep from bluff it, and prevent heavy hair attack, etc.

    安全协议能够有效保护数据完整性、保护信息不可抵赖防止攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定