助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   传统安全 在 计算机软件及计算机应用 分类中 的翻译结果: 查询用时:0.104秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
中国政治与国际政治
互联网技术
安全科学与灾害防治
世界历史
经济体制改革
工业经济
伦理学
电信技术
更多类别查询

图标索引 历史查询
 

传统安全
相关语句
  traditional security
    This paper, after researching and analysing the security theories and technologies of traditional security operating system, with the characteristics of the embedded system, puts forward a security kernel frame which is suitable for embedded operating system: ESK_EC(embedded security kernel of Win CE).
    本文在研究分析传统安全操作系统的安全理论和技术的基础上,结合嵌入式操作系统的特点,提出了一种适合于嵌入式操作系统的安全核框架:ESK_EC (embedded security kernel of Win CE)。
短句来源
    With the development of network commercial affair and network computing technology, the research of security problem is deepened more and more , especially Web services based on XML technology gradually ripe and deploy application in recent years, the traditional security solution (such as PKI technology ) hasn' t met new security needs , the security problem has already become one of the main obstacles that prevent web services from using on a large scale.
    随着网络商务和网络计算技术的发展,对安全问题的研究越来越深入,特别是近年来基于XML的Web服务(Web Services)技术使用的越来越多,传统安全解决方案(如PKI技术)已经不能满足新的安全需要,安全问题也已经成为web服务技术大规模应用的障碍之一。
短句来源
    2. Security kernel architecture. Based on the analysis of the limitations in the traditional security kernel and reference monitor, this paper presents a security kernel architecture supporting dynamical policies.
    2.安全核体系结构 本文在分析传统安全核和引用监视器的作用及其不足的基础上,提出了一种支持动态策略的安全核体系结构。
短句来源
    XML Security technology can guarantee data of being transported integrated , confidential and nonrepudiation. It also can compensate the deficiency of traditional security technology and enchance the security of web resources.
    XML安全技术能保证被传输数据的完整性、真实性、不可否认性,它可以弥补传统安全技术所存在的不足,能有效地增强WEB资源的安全性。
短句来源
    As an active information security protection method, intrusion detection makes up for the disadvantages of the traditional security technologies effectively.
    入侵检测作为一种主动的信息安全保障措施,有效地弥补了传统安全防护技术的缺陷。
短句来源
更多       
  “传统安全”译为未确定词的双语例句
    In the aspect of security mechanism, this paper refers to the developing method of conventional secure operating system, and builds the security strategies after making an analysis on the security requirements of C2 level detailedly.
    在ESOS安全机制方面,本论文参照了传统安全操作系统的开发方法,对C2级体现的安全需求进行详细的剖析,并结合ESOS的实际情况制定了安全策略,然后在分析几种经典的安全模型的基础上,选择了一个合适的安全模型,并进行必要的改造。
短句来源
    Based on research and analysis of traditional embedded operating system security theories and technologies, combining with characteristics of embedded operating system, this paper puts forward a security kernel frame fit for embedded operating system: ESK(embedded security kernel).
    在研究分析传统安全操作系统的安全理论和技术的基础上,结合嵌入式操作系统的特点,提出一种适合于嵌入式操作系统的安全核框架:ESK(embedded security kernel)。
短句来源
    With the fast development of network technique and with the emergence of diversification security threats, traditional design theory and structure of security OS can’t solve the secure problems in actual world.
    随着网络技术的飞速发展和安全威胁的多样化,传统安全操作系统的设计理念和体系结构已难解决现实中的安全问题。
短句来源
    Lastly, I thorough study the main security technology of security OS include discretionary access control and mandatory access control,security kernel technic and its layering design method and loop separate design method. Secure attribute and its revoke mechanism and the implement of security policy are deep studied too.
    深入研究了安全操作系统自主访问控制和强制访问控制机制,研究了传统安全核技术及其分层设计方法和环型设计方法,研究了安全属性及时撤消技术和安全策略的实施机制。
短句来源
    This paper points on the distributed architecture. Upon the based of Flask/Fluke and LSM security common framework and according to the theory of composite security model, the idea to extend traditional architecture of security OS is suggested;
    本文以操作系统分布式体系框架为研究点,在借鉴Flask/Fluke体系结构和LSM安全通用框架的基础上,依据安全模型的可组合原理,提出扩展传统安全操作系统的体系结构;
短句来源
更多       
查询“传统安全”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  traditional security
Traditional security solutions cannot satisfy the Web Services security require of selective protection, end-to-end security and application layer security.
      
The paper analyses the security dimension of the Greater Mekong Subregion (GMS) by taking into account traditional as well as non-traditional security issues.
      
This article argues that the Asia-Europe Meeting (ASEM) process of multidimensional dialogue plays a prominent role in addressing issues of transnational security in both regions mainly in the field of "soft" and non-traditional security affairs.
      
This thematic issue of International Negotiation on non-traditional security negotiation provides detailed cases and analyses that demonstrate and contrast how the negotiation process performs in resource, economic, food, and military security talks.
      
Traditional security is not a major concern for Pacific Island countries and has not been for at last 50 years.
      
更多          


The basic knowledge and development of network security is introduced and the state of security of operation system is summarized, then the hidden trouble of current system is also discussed. As a result, the corresponding solution is brought forward including traditional security measurements and a complete set of solution of hidden trouble for the current network flat.

简述了网络安全的发展过程及网络安全的基本知识 ,操作系统安全性的现状 ,探讨了现有系统所存在的隐患 ,并提出了相应的解决方案 ,包括传统的安全措施和一整套解决网络平台安全性问题的方案。

Multilevel secure database has three basic properties:confidentiality,integrity and availability,but integrity is always at odds with security.In order to acquire confidentiality,most of current multilevel secure systems have to sacri-fice the integrity and availability.This paper introduces a method for improving the traditional multilevel secure data model and the extended model has more confidentiality without sacrificing the system's data integrity and availability.

保密性、完整性和可用性是多级安全数据库必须具备的三要素,然而完整性和保密性的要求往往不一致,现有的多级安全系统一般采用牺牲数据完整性和可用性的方法来获得较高的保密性。该文通过对传统安全模型进行改造,使之具有较高的保密性、数据完整性和可用性。

Banker algorithm avoids deadlock by safety algorithm. The time performance of safety algorithm of normal banker algorithm is analyzed. The normal time performance can be improved by sorting process in terms of resource requirement before deadlock detection, decreasing the calculation from O(n~2) to O(n).

银行家算法通过执行安全算法来避免死锁。文章分析了传统银行家算法中安全算法的时间性能,提出在判断安全前,将进程按资源的需求量从小到大进行排序,可以改进传统安全算法的时间性能,将时间性能的量级从O(n2)下降为O(n)。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关传统安全的内容
在知识搜索中查有关传统安全的内容
在数字搜索中查有关传统安全的内容
在概念知识元中查有关传统安全的内容
在学术趋势中查有关传统安全的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社