助手标题
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
共[108]条 当前为第21条到40条[由于搜索限制,当前仅支持显示前5页数据]
 

相关语句
traditional security
    Except for that, the United States of America will still keep an eye on the traditional security, simultaneously, keep away the threat of the non-traditional security, especially it will prevent to come into being the dominant power on the Euro-Asian continent.
    在防范非传统安全威胁的同时,依然对传统安全问题保持警惕,特别是防止在欧亚大陆出现一个主导性的强权。
    Secondly, through analyzing the reality of the world at present, make clear the difference and relation between the concepts of traditional security and non-traditional security so as to get the initial boundary of non-traditional security.
    二、通过对当今世界现实状况的分析,明确传统安全与非传统安全区别与联系,得出对非传统安全概念的初步界定。
    The Intrusion Detection technology is a complementarity technology for traditional security protecting technology, such as firewall. It can identify and response to malice activities.
    入侵检测技术是对传统安全技术(如防火墙)的合理补充,它能够对恶意或危害计算机资源的行为进行识别和响应。
    She abandoned the traditional security views that the political unification must depend on the religious unification, and implemented the new reign conception that political unification was separated from the religious unification.
    她大胆摒弃政治统一必须依赖宗教统一的传统安全观,积极践行政治统一与宗教统一相分离的新治国理念。
    As an active protection measure for the information security, the intrusion detection effectively makes up the deficiency in the traditional security protection technology.
    入侵检测(Intrusion Detection)作为一种主动的信息安全保障措施,有效地弥补了传统安全防护技术的缺陷。
    Being a kind of voluntary information protecting measures, intrusion detection is complement of traditional security protect technology such as firewall, data encryption and etc.
    入侵检测作为一种主动的信息安全保障措施,是对“防火墙”、“数据加密”等传统安全防护技术的有效补充。
    It makes up the limitation of traditional security defending technology.
    它有效地弥补了传统安全防护技术的缺陷。
    As a kind of active measure of information security assurances, intrusion detection acts as an effective complement to traditional security protection techniques.
    入侵检测作为一种主动的信息安全保障措施,有效地弥补了传统安全防护技术的缺陷。
    Secondly, the paper introduces the conception of audit and the history of traditional security audit system. It analyses the lack of security measure in common use, and the Network Security Audit System. The paper introduces two kinds of realizing method specifically of net security audit system: based on the database and based on the Statistic.
    其次,介绍了审计的概念和传统安全审计系统的历史,分析了常用安全措施的不足,并在此基础上产生的基于网络的安全审计系统,具体介绍了两种基于网络的安全审计系统的常用的实现方法:基于数据库的方法和基于数理统计的方法。
    The dissertation firstly analyzes the current problems of traditional authentication system, put forward a method of combining those advantages of Web Services and traditional security technologies on the basis of summarizing three methods of solving those problems.
    论文首先介绍传统独立认证系统存在的弊端,在分析总结解决独立认证问题的三条途径的基础上,提出了结合Web服务和传统安全技术两者优势的解决方法。
    NET, the dissertation develops a model of authentication system which has the function of Single Sign-on by the way of combining Web Services and traditional security technologies, simulates the structure of the model system and testfies those methods of preventing common attacks of it.
    最后,在.NET基础上采用Web服务和传统安全技术相结合的设计思想,提出了具有SSO功能的原型系统,并对原型系统的结构进行模拟实现,对常见攻击作了预防验证。
    XML Security technology can guarantee data of being transported integrated , confidential and nonrepudiation. It also can compensate the deficiency of traditional security technology and enchance the security of web resources.
    XML安全技术能保证被传输数据的完整性、真实性、不可否认性,它可以弥补传统安全技术所存在的不足,能有效地增强WEB资源的安全性。
    As an active information security protection method, intrusion detection makes up for the disadvantages of the traditional security technologies effectively.
    入侵检测作为一种主动的信息安全保障措施,有效地弥补了传统安全防护技术的缺陷。
    From levels of international politics, regional affairs, traditional security, non-traditional security and bilateral affairs, the first part of the thesis expounds the common strategic interests of China and Russia in SCO, sets forth the reasons why the two countries hold common strategic interests, and points out such characteristics as dominantive, universality and permanence of the interests ?
    论文第一部分从国际政治、地区事务、非传统安全传统安全和双边事务五个层面论述中俄两国在上海合作组织中共同战略利益的表现,并从两国外交理念、外交述求等角度探求两国在该组织拥有共同战略利益的原因,指出两国共同战略利益的主导性、广泛性和持久性特点。
    Then, aiming at the comment security threats of SIP, the problem of some used in SIP traditional security protocols' leakage of identity authentication and no providing the function of key negotiation, the method of SIP's identity authentication and key negotiation is researched in this thesis. An idea of improved HTTP digest authentication is presented, and a SIP security communication system based on HTTP digest authentication is designed and implemented. The main content is as below:
    接着,本文针对SIP 常见的安全威胁,及现今常用于SIP 中传统安全协议存在的身份认证有漏洞,不提供密钥协商功能等问题,对SIP 的身份认证和密钥协商方式进行了研究,提出了一种改进的HTTP 摘要认证的思想,并设计实现了基于HTTP 摘要认证的SIP 安全通信系统,主要内容如下:
    As an active measure to safeguard information security, Intrusion Detection effectively make up the defect of traditional security technology.
    入侵检测作为一种主动的信息安全保障措施,它有效的弥补了传统安全防护技术的缺陷。
    Compared with Traditional Security, Non-traditional Security develops from its intension and extension. Not only have they diseparatable interrelationship but also have distinctive difference.
    非传统安全是相对于传统安全而言的,是传统安全观内涵与外延扩展演变而来的。
    Intrusion detection, named the second defend line of the network security, is become the necessary part of the network security system, as it can identify the intrusions positively and respond on the decided policy, which can be effective make up for the limitations of the traditional security defend techniques.
    入侵检测(Intrusion Detection)虽然被称为网络安全的第二道防线,但由于其能够主动识别入侵行为并能够按照既定的策略进行响应,可以有效地弥补传统安全防护技术的缺陷,已经成为了网络安全系统的必不可少的部分。
    As an active security defense technology, network analysis and detection system makes up for the weaknesses of traditional security technologies.
    网络分析、检测技术是一种主动防御型安全技术,可以弥补传统安全技术的不足。
    The following contents are studied in the thesis:1. For the disadvantage of traditional security models: vague target and loose coupling with real business process, a Workflow-based Security Model (WSM) for the protection of banking system is presented, which is carried out in a systematic engineering approach and tightly couples to real systems.
    1.针对传统安全模型存在针对性不强、与实际业务结合不紧密等问题,本文采用系统工程的方法,提出了一种基于工作流的银行系统安全防护模型。
 

首页上一页12345下一页尾页 

 
CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社