助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   安全原型 的翻译结果: 查询用时:0.21秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

安全原型
相关语句
  security prototype
     The key technology of the network and information security prototype system is studied,the network and information security test platform is introduced,and the testing methods are explained.
     主要研究了网络与信息安全原型系统中的关键技术,介绍了网络与信息安全测试平台的组成,阐述了测试方法。
短句来源
     By the aid of pluggable module,a security prototype is designed in the active network,which facilitates the security in the aspects of encryption,digital signature,authorization,authentication and revocation.
     提出利用可插入模块方式设计主动网络动态可扩展的安全原型 ,实现了加密与数字签名、授权、验证和代码撤消等方面的安全 .
短句来源
  “安全原型”译为未确定词的双语例句
     Research on Virtual Enterprise Information Safety Prototype Based on MC-Web
     基于MC-Web的虚拟企业信息安全原型研究
短句来源
     After been doing plenty research on the long process of firewall system development, we decided to establish a safe network gateway model prototyping based on Linux p latform. By utilizing the features of netfilter in Linux kernel space and iptables mechanism in the user space, the PLBDHG(Prototyping A Linux-Based Distributed Hybrid Gateway) has been built and could implement multi-level protection in our network system.
     论文通过对Linux内核安全机制的研究和学习,在分析Linux内核Netfilter安全功能框架和安全辅助体系Iptables工作原理的基础上,提出一种基于Linux平台的分布式复合网关安全原型(PLBDHG Prototyping A Linux-Based Distributed Hybrid Gateway)。
短句来源
  相似匹配句对
     SECURITY
     安全
短句来源
     Research on Network Isolation and Secure Data Exchange Prototype
     网络隔离与安全交换原型研究
短句来源
     Finally, a prototype of security integrated management system was realized.
     4、实现一个安全综合管理系统原型
短句来源
     Safety of Colour TV Tube
     彩色显像管的安全
短句来源
     the Theory of Prototype Enlightenment
     原型启发论
短句来源
查询“安全原型”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
没有找到相关例句


By the aid of pluggable module,a security prototype is designed in the active network,which facilitates the security in the aspects of encryption,digital signature,authorization,authentication and revocation.The encryption and digital signature ensure the integrity and confidentiality to the active code.The decode-binding realizes the expansion capacity of the encryption methods in the system.By means of the certificate-checking method,the whole system designs a certificate center that issues X.509 certificate...

By the aid of pluggable module,a security prototype is designed in the active network,which facilitates the security in the aspects of encryption,digital signature,authorization,authentication and revocation.The encryption and digital signature ensure the integrity and confidentiality to the active code.The decode-binding realizes the expansion capacity of the encryption methods in the system.By means of the certificate-checking method,the whole system designs a certificate center that issues X.509 certificate and manages the certificate through light directory access protocol (LDAP).With the active capability adapted to describe any authorization policy,the system can either choose the permitted policy or change the policy according to the requirements of the users .The revocation designed for the active network ensures the validity in the operation of the active code.In the meantime,with the trace records in the database,the revocation can realize the security alarm in the whole system.

提出利用可插入模块方式设计主动网络动态可扩展的安全原型 ,实现了加密与数字签名、授权、验证和代码撤消等方面的安全 .加密与数字签名解决了主动代码的完整性和机密性问题 ;使用解码绑定方式 ,实现了可扩展的系统加密方法 .系统采用基于证书的验证方式 ,专门设计证书中心 ,负责颁发X 5 0 9格式的证书 ,使用目录服务器(LDAP)对证书进行管理 .用主动权来描述任何可以表示的授权策略 ,系统既可以使用默认的某种策略 ,也可以根据用户需要更换策略 .代码撤消部分的设计保证主动代码执行的有效性 ,同时根据数据库对代码的跟踪记录 ,进行安全预警 .

This paper presents a model which can support network security objects, improve the Amon ott抯 rules with small amount of operations and storages for practicality, enhance the flexibility available for system implementation by making the single level becoming level range , and control IPC objects effectively. For these purposes, the Amon ott抯 rules for dynamically modifying the current sensitivity level are extended to ones for sensitivity levels range, so Bell's work on making the single level becoming level...

This paper presents a model which can support network security objects, improve the Amon ott抯 rules with small amount of operations and storages for practicality, enhance the flexibility available for system implementation by making the single level becoming level range , and control IPC objects effectively. For these purposes, the Amon ott抯 rules for dynamically modifying the current sensitivity level are extended to ones for sensitivity levels range, so Bell's work on making the single level becoming level range for network security can be combined with Amon ott抯. Considering the cases in the practical system GEMSOS,DG/UX and prototype microkernel system Fluke, single level entity, multiple level entity and special access mode for progress, and the invariants and constraints corresponding to them are introduced. Based on Tmack抯 way, a sufficient mechanism for IPC objects is posed. In addition, some flaws in ABLP model are pointed out. A new confidentiality policy model with formal specification of invariants, constraints, variables, and constants has been presented with demonstrating reasonableness for some constraints, and it can be used for system design.

试图提出一个模型,它能为有效处理网络安全对象提供支持.改进Amon ott的动态调整规则,使需要动态改变的量减少,从而使一个系统调用级的原子操作需要伴随的附加量的操作和存储减少,提高模型在系统中的实用性.通过把当前安全级变成敏感标签范围而增加模型在系统实现中的灵活性,能有效控制IPC对象.为此,把Amon ott动态地调整当前敏感标签的规则推广为动态地调整敏感标签范围的规则,这把Bell为处理网络情况而把主体的当前安全级变成敏感标签范围的工作与Amon ott的工作有机地结合起来,同时,参考实际中使用的系统GEMSOS和DG/UX及安全原型微内核系统Fluke,引入了单级实体、多级实体以及专用于进程的访问模式,并给出了它们应满足的不变量及限制性条件.另外,在参考原型系统TMach对IPC对象的某些处理方式的基础上,提出了使动态特征非常明显的IPC对象得到合理、有效管理的机制,同时还分析了ABLP实施方法中存在的一些不当之处.提出了一个新的机密性策略模型DBLP的模型不变量,限制性条件及变量类型和常量,并分析了一些限制性条件的合理性,它可以有效应用于系统设计.

Utilizing the trait that protocol can be deployed dynamically in active net, the component-based security mechanism is designed for active ne tworks on the base of the security prototype of active networks. The mechanism can meet the security requirement of the active networks, such as secrecy, integrality and usability, and provides security measure including extensible encryption and decryption, authentication and authorization, execution monitor and code revocation, etc for active packet and active node....

Utilizing the trait that protocol can be deployed dynamically in active net, the component-based security mechanism is designed for active ne tworks on the base of the security prototype of active networks. The mechanism can meet the security requirement of the active networks, such as secrecy, integrality and usability, and provides security measure including extensible encryption and decryption, authentication and authorization, execution monitor and code revocation, etc for active packet and active node. In addition, it supports dynam itic load and customization, therefore security level can be customized for active networks according to the actual application.

在主动网络安全原型的基础上,结合主动网络可动态加载协议的特点,提出了基于组件的主动网络安全机制。该机制能够适应主动网络保密性、完整性和可用性的安全需求,为主动节点和主动信包提供了可扩展加解密、信包验证、代码授权、代码执行监控以及代码撤销等一系列安全措施;同时支持动态加载和用户定制,使得主动网络可以根据具体应用设定不同的安全级别。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关安全原型的内容
在知识搜索中查有关安全原型的内容
在数字搜索中查有关安全原型的内容
在概念知识元中查有关安全原型的内容
在学术趋势中查有关安全原型的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社