助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   分层安全 的翻译结果: 查询用时:0.023秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

分层安全
相关语句
  layer security
     Web services layer security model
     一种面向Web服务的分层安全模型
短句来源
     A new web service layer security model is proposed,and its communication mechanism and implementation method are research.
     针对Web服务应用模式,提出了一种基于XML安全技术的分层安全模型,研究了该模型的通信机制和实现方法,并对SOAP消息的安全通信进行了探讨。
短句来源
     Based on these discussion, Web service was integrated with some mature security architectures such as PKI. A new Web service layer security model was proposed, and its characteristics were described.
     在此基础上 ,将目前成熟的安全体系结构PKI和Web服务融合起来 ,提出了一个新的基于XML的Web服务分层安全模型 ,并对其安全性和特点进行了详细的分析论述。
短句来源
  “分层安全”译为未确定词的双语例句
     Practice on Forming a Set of Equipment and Technology of Safety and High Efficiency Mining in Two Slices Seam
     二分层安全高效开采配套设备及工艺实践
短句来源
     The solution for network security with smart antennas is presented, which optimizes smart antennas with the layered security architecture.
     通过利用智能天线技术,提出解决网络安全的改进方案,同时提出采用分层安全结构体系对智能天线进行优化。
短句来源
     With layered security model,this paper studies the security protocol and performance of IEEE802.11 WLAN,different security mechanisms' effects on the security performance under condition of multi-client,congested and un-congested networks. Thus it proves in case of having a limited effect on performance of the wireless network,combining WEP and 802.1x,using centralised authentication and dynamic key management,we can obtain the security of wireless network better than WEP.
     论文通过分层安全模型研究了IEEE802.11WLAN安全性协议的性能以及在多用户、拥塞和非拥塞情况下,不同安全机制对安全网络性能的影响,从而论证了在对无线网络性能影响有限的情况下,WEP与802.1x结合使用,采取集中认证和动态密钥管理机制,可以获得比WEP更好的无线网络安全性。
短句来源
     Hierarchy Requirements and Verification for Cryptographic Protocols
     密码协议的分层安全需求及验证
短句来源
     1、The layered safety-interlocking configuration was adopted in the controlsystem.
     控制系统的安全性与可靠性分析。 1、控制系统采用分层安全联锁结构。
短句来源
更多       
  相似匹配句对
     SECURITY
     安全
短句来源
     Network Security Settlement of Layered LAN
     分层局域网网络安全解决方案
短句来源
     Network Security and Key Technology
     通信网络安全分层及关键技术
短句来源
     Safety Cartoon
     安全画廊
短句来源
     social stratification
     社会分层
短句来源
查询“分层安全”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  layer security
Traditional security solutions cannot satisfy the Web Services security require of selective protection, end-to-end security and application layer security.
      
Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used on the Internet, together with its predecessor, SSL protocol.
      
Optimizing the Energy Consumed by Secure Wireless Sessions - Wireless Transport Layer Security Case Study
      
In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol.
      
Furthermore, we provide observations on cross-layer security protocols and suggestions to the design of future security protocols for real-time services in wireless LANs.
      
更多          


This paper gives a layered security policy of applieation program protected,And it has described a desiging idea on base of a FoxPro's platfrom &,implementation process.

给出了一个应用程序的分层安全保护策略,并详细描述了基于FoxPro平台的设计思想和实现过程.

The security requirements for cryptographic protocols were divided into shallow requirements and deep requirements. The hierarchy security requirements were illustrated. Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols. A model of computation was developed by modifying and extending the Abadi and Tuttle model, combining BAN logic and the NRL Protocol Analyzer. Using this model and theorem proving techniques,...

The security requirements for cryptographic protocols were divided into shallow requirements and deep requirements. The hierarchy security requirements were illustrated. Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols. A model of computation was developed by modifying and extending the Abadi and Tuttle model, combining BAN logic and the NRL Protocol Analyzer. Using this model and theorem proving techniques, the formal requirements of the Otway Rees protocol was verified.

将密码协议的安全需求分为浅层需求和深层需求 2个层面 ,阐述了密码协议的分层安全需求 .采用近世代数和时序逻辑的方法定义了形式化描述语言 ,并形式化地描述了密码协议的分层安全需求 .将类BAN逻辑与模型检查相结合 ,在Abadi Tuttle模型的基础上建立密码协议的计算模型 .以Otway Rees协议为例 ,利用该计算模型和定理证明技术对密码协议进行了多层需求验证

The paper introduced the characteristics of Web service, and discussesd XML security key technologies related to Web service. Based on these discussion, Web service was integrated with some mature security architectures such as PKI. A new Web service layer security model was proposed, and its characteristics were described. Finally, the security services sub-layer XKMS was designed and implemented.

介绍了Web服务的特点 ,讨论了与Web服务相关的XML安全技术。在此基础上 ,将目前成熟的安全体系结构PKI和Web服务融合起来 ,提出了一个新的基于XML的Web服务分层安全模型 ,并对其安全性和特点进行了详细的分析论述。最后给出了该模型中的核心部分———安全服务子层的设计实现。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关分层安全的内容
在知识搜索中查有关分层安全的内容
在数字搜索中查有关分层安全的内容
在概念知识元中查有关分层安全的内容
在学术趋势中查有关分层安全的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社