助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   secure information system 的翻译结果: 查询用时:0.193秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
互联网技术
更多类别查询

图标索引 历史查询
 

secure information system
相关语句
  安全信息系统
     After that, the author constructs the scheme of Secure Information System for teaching administration, gives the secure model of it, and expounds the methods and technologies to implement it, and at last realizes it.
     在此基础上提出了构建面向教学管理系统的安全信息系统的方案,给出了教学管理系统的安全模型,阐述了构建安全系统的实现方法和具体技术,最后实现了这个安全系统。
短句来源
     Implementation of Secure Information System Based on COM /DCOM
     基于COM/DCOM的安全信息系统实现
短句来源
     Research on electrical equipment on-line monitoring common secure information system based on B/S
     基于B/S模式的电力设备在线监测通用安全信息系统的研究
短句来源
     Analysis of Random Number Generators and Their Applications in Secure Information System
     随机数发生器分析及其在安全信息系统中的应用
短句来源
     Random number is widely used in cryptography and secure information system, which is mainly used as key.
     随机数在密码学和安全信息系统中有着广泛的应用,它的主要用途之一是用作密 钥。
短句来源
更多       
  保障信息系统
     Design of Social Secure Information System Based on Data Center
     基于数据中心的社会保障信息系统设计
短句来源
     The social secure information system based on data center are discussed, and also its advanced characteristics. The subsystem such as core-business system, data center system, card center system, decision support system and people call enter system are discussed.
     讨论了基于数据中心的社会保障信息系统的设计,给出了系统的总体结构,论述了其先进特色,并分别说明了其核心业务系统、数据中心系统、卡中心系统、决策支持系统、公众服务中心系统的设计。
短句来源
  “secure information system”译为未确定词的双语例句
     The Elementary Search of the Secure Information System of Mistakes Information Management
     安全、可靠的故障信息管理系统初探
短句来源
     Secure Information System Construction for Manufacturing Enterprise
     论制造企业的信息安全建设
短句来源
     The system design, database design, main system module fuction on a science and research MIS as the instance are explained in detail about, which is built as a complicated secure information system according to the secure layer and architecture model of the computer information system . Besides, the optimization of application system and database system are deeply discussed .
     接着以一个科研项目管理信息系统开发和构筑为实例,详细说明了系统的设计、数据库设计、系统模块的主要功能,以及如何根据计算机信息系统的安全层次和结构模型,运用计算机信息安全技术构筑和开发一个复杂的安全的信息系统,并对应用系统及数据库系统的优化做了进一步的探讨。
短句来源
     With the development and the ampliative applying-scope of network technology, the exchange of network information is more frequent and important, so we need to establish secure information system.
     随着网络技术的发展和应用范围的扩大,网上信息交换日趋频繁和重要,从而需要建立安全的信息系统。
短句来源
     The paper introduced how to make use of the Secure Information System of Mistakes Information Management to evaluate, analyse, diagnose and repair the broken-down computers, as a result of overcoming the random and blindfold mistakes caused by the manual work.
     本文介绍如何利用安全、可靠的故障信息管理系统,进行机房机器故障的评估、分析、诊断、修复实现故障维护信息管理自动化。
短句来源
查询“secure information system”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  secure information system
The suggested basis of the secure information system is an intelligent security system.
      


The aim of intrusion - detection systems is to detect attacks against computer systems and networks. As a novel security mechanism to provide provably secure information systems, intrusion - detection systems have the task of monitoring the usage of such systems. They detect user's attempts of the information systems or external parties to abuse their privileges or exploit security flaws. In this paper, the mainly design model and implement technology of Intrusion Detection...

The aim of intrusion - detection systems is to detect attacks against computer systems and networks. As a novel security mechanism to provide provably secure information systems, intrusion - detection systems have the task of monitoring the usage of such systems. They detect user's attempts of the information systems or external parties to abuse their privileges or exploit security flaws. In this paper, the mainly design model and implement technology of Intrusion Detection System are discussed, Then the Intrusion detection model based on the agent mechanism and its key implement technology are presented.

入侵检测系统用于检测对计算机系统和网络的攻击。作为一种新型的信息系统安全机制,通过监控这些信息系统的使用情况,来检测信息系统的用户越权使用以及系统外部的入侵者利用系统的安全缺陷对系统进行入侵的企图。本文首先分析了入侵检测系统的主要模型及其实现技术,然后,对网络环境下基于代理机制的入侵检测模型及其主要实现技术进行了讨论。

Reference Monitor (RM), Security Policy (SP), and the like, are fundamental concepts of computer security which are of great significance to both development and application of secure information systems. This situation has nagative effects on the application as well as the research and development of information security systems. This paper analyzes the origin and utilization of RM, SP and other relevant concepts, and presents our points of view on the right understanding and the felicitous...

Reference Monitor (RM), Security Policy (SP), and the like, are fundamental concepts of computer security which are of great significance to both development and application of secure information systems. This situation has nagative effects on the application as well as the research and development of information security systems. This paper analyzes the origin and utilization of RM, SP and other relevant concepts, and presents our points of view on the right understanding and the felicitous Chinese naming of these notions. Sufficient evidences are employed to argue for the correctness of our viewpoints.

Reference Monitor(RM)和 Security Policy(SP)等是非常基础的计算机安全概念 ,本文对 RM和 SP及相关的概念的形成过程和应用情况进行分析 ,就它们的真正意义及准确的中文命名给出我们的看法 ,同时指出现有的对应中文术语的不贴切之处 .我们以充足的证据阐明我们的观点的正确性 ,以求能为计算机安全系统的研发和应用提供正确借鉴 .

It may cause various secure defectiveness to develop,upgrade and integrate the Information System.The im-plementing way of secure information system is proposed,which is based on the COM/DCOM technology and compre-hensively utilizes ACL,DES and communication on the given protocol port.The present way has tackled with such key issues of information system as user authentication,file privilege setting and monitoring the client.The way in the paper can eliminate the secure hole of information...

It may cause various secure defectiveness to develop,upgrade and integrate the Information System.The im-plementing way of secure information system is proposed,which is based on the COM/DCOM technology and compre-hensively utilizes ACL,DES and communication on the given protocol port.The present way has tackled with such key issues of information system as user authentication,file privilege setting and monitoring the client.The way in the paper can eliminate the secure hole of information system.

信息系统的开发、升级和集成过程中,造成了不同程度的安全隐患。文章结合作者在微机室综合信息系统的研究、开发过程中,在用户认证、文件权限设置、客户端监控等关键问题的处理中,采用COM/DCOM技术,综合应用ACL、DES及指定通信协议端口来建立安全信息系统的方法,解决了造成信息系统安全隐患的几个关键问题。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关secure information system的内容
在知识搜索中查有关secure information system的内容
在数字搜索中查有关secure information system的内容
在概念知识元中查有关secure information system的内容
在学术趋势中查有关secure information system的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社