保密管理

保密管理保密管理
  1. 浅谈测绘成果的应用与保密管理模式

    Discussion on Mode of Security Management and Use of Surveying and Mapping Achievement

  2. 浅谈数字化政府的信息安全与保密管理

    About Security and Secrecy of Digital Government Information

  3. 基于辅助决策的高校保密管理系统应用研究

    The Application Investigation of Security Management System in University Based on Aided Decision Technology

  4. 市场经济对农业科研成果保密管理的挑战与应对

    Challenges and Countermeasures for Security Management of Agricultural Scientific Research Fruit under Social Market Economy

  5. 技术的支撑与相应设备、设施、人才队伍的支持,是做好武警部队信息安全保密管理工作的关键。

    Technical support and relevant equipment , facilities , personnel support are the keys of doing information security management of Armed Police Force well .

  6. 市场化网络化条件下我国科技保密管理体系运行中的问题及其对策

    Study on the Problems and Countermeasures in an Operation of Management System of Technology Secrecy under the Conditions of the Socialist Market and Popularization of Internet

  7. 产品信息保密管理方法及其信息支持系统的研究,为产品信息保密管理的应用提供了一组基础性方法,有利于推动产品信息保密管理理论与实践的发展,对现阶段我国企业具有现实意义。

    The study of product information security management method and its support system is favorable to promoting information security management theory and practice with practically significant to enterprises .

  8. 该系统的开发和应用更好的加强了国防科技工业的保密管理宣传工作,提高了涉密人员的保密意识和知识,对于大学各项保密工作的开展与落实具有重要的意义。

    The development and application of this system strengthens the classified management of the public work of national defense technology industry ; increases the security awareness and knowledge of classified staff .

  9. 本文重点研究并提出了企业信息保密管理方案体系的制定过程以及信息安全风险评估的方法,并提出了企业信息保密管理的组织和管理架构。

    It puts emphasis on the procedures of setting up confidentiality management infrastructure and methods of assessment to information security risk . It also proposes to an organization and management framework of enterprises confidentiality management .

  10. 由于网络存在着许多重要、敏感数据,因此,信息安全已越受人们的关注,确保信息的安全性,一般通过建立数据保密管理的规章制度及采用密码学的方法来保证。

    Because there are many sensitive and important data on the internet , the information security has been paid to more and more attention . To ensure the security of information , the general way is through building the regulations of information government and the methods of cryptology .

  11. 一种信息保密智能管理系统的设计与核心技术

    Architecture and Core Mechanisms of the Protecting Information Intelligent System

  12. 本文从保密性管理,使用权限管理,存储管理和网络化管理等方面,论述了电算化条件下如何做好会计档案管理工作。

    This paper discussed how to do the account files management under the condition of using computers on the aspects of secrecy management , using right management and deposit management .

  13. 企业才刚刚意识到,几乎或根本没有保密政策来管理敏感数据,是十分危险的,安永技术与安全风险服务主管理查德•布朗(RichardBrown)表示。

    Businesses are only just waking up to the dangers of having little or no privacy policy in place for managing sensitive data , said Richard Brown , head of technology and security risk services at Ernst & Young .

  14. 早期规范中的认证与密钥管理协议为保密密钥,管理(PKM),数据保密机制包含基于DES-CBC和AES-CCM的两个解决方案。

    In earlier version , authentication and key management protocol is called Privacy Key Management ( PKM ); and data protection protocols include two solutions based on DES-CBC and AES-CCM .

  15. 实验室根据这些条例制定了若干保密措施和管理程序。

    From these requirements , the Lab develops the protection methodology and procedures .

  16. 所以,保密在档案管理中的重要作用是毋庸置疑的。

    Therefore , the important role of the secrecy in archives management is beyond doubt .

  17. 组播安全问题包括:数据保密、组管理和访问控制、源认证等多个方面。

    The issue of multicast security consists of data confidentiality , group management , data source authentication and so on .

  18. 遗憾的是,似乎没人尝试量化这种变化的规模。风险管理者往往对内部操作保密,部分管理者只在最近才开始调整他们的账簿。

    Sadly , nobody seems to have tried to quantify the scale of this shift ; risk managers tend to be very secretive about their internal practices and some have only started to reorganise their books quite recently .

  19. 随着企业内部的网络规模越来越大及计算机终端数量越来越多,企业内部的信息泄密和安全威胁事件层出不穷,给安全保密和日常管理工作带来很大的压力。

    With the enterprise internal network size increasing and computer terminals number growing more and more , the information leaks and security threats emerged one after another in the enterprise . It gives security and daily management of a great deal of pressure .

  20. 混沌同步效应及其在保密通讯和现代管理中的应用

    Chaos synchronization effect and its application in modern communication

  21. 新时期高等学校保密工作特点及管理新机制研究

    Study on the Characteristic and New Management Mechanism Applied in the Current Secrecy Keeping Work of Universities

  22. 不用说,这个决定是高度保密的,高层管理者还没有意识我的意图。

    Needless to say , this decision is highly confidential , and the senior management is unware of my intention .

  23. 本文讨论了保密通信中密钥管理,提出一种混合型的密钥管理系统,并介绍该系统的实现方法。

    The questions about key manage are discussed , a new key manage system is given , and the method about the system realization is introduced .

  24. 通过从省、市、区县逐级设置权限,不同权限的单位访问的范围和内容各不相同,实现数据的保密性和分层管理的模式。(4)数据资源共享。

    Setting different permissions according to province , city and county , different permission units ' visit scope and content will differ from others . Through this way , we can realize the data confidentiality and layered management mode . ( 4 ) Data resource sharing .

  25. 加入WTO后的中国,应当高度重视商业秘密的预防性保护,增强保密观念,完善保密制度,加强保密管理,提高保密技术水准。

    China , after her entry into WTO , should attach great importance to the preventive protection of trade secrets , heighten the sense of security , perfect the security institutions , strengthen the security management , and raise the technical standard of security .

  26. 各部门、各单位使用保密测绘成果,必须按照国家保密法规进行管理。其密级不得低于原使用的地理底图和其他基础测绘成果的密级。

    Various departments and units must , in using classified achievements in survey and drawing , carry out administration in accordance with the relevant laws and regulations of the State on guarding secrets .