信息安全

xìn xī ān quán
  • information security
信息安全信息安全
  1. 加强信息安全和隐私保护。

    The meeting underlined the need to strengthen information security and privacy protection .

  2. XML数字签名在信息安全中的研究与实现

    XML Digital Signature in Information Security Research and Implementation

  3. ERP软件系统信息安全问题探讨与实现

    Investigation on the Information Security for ERP Software System

  4. 随着Internet的迅猛发展和广泛应用,计算机病毒及黑客的破坏活动也随之猖獗,网络的信息安全问题已显得日益突出。

    With the rapid development of Internet and the comprehensive application , the virus and the hacker 's destruct is also rampant .

  5. 随着Internet的迅速发展和广泛应用,网络信息安全的重要性和紧迫性日益突出。

    With the development and wide application of Internet , the security of network and information is becoming more and more important and urgent .

  6. Hash函数在信息安全中随机序列发生器中的应用

    Application of Hash Function in Random Number Generators of the Information Security

  7. 基于ANN的SR技术研究及在信息安全中的应用

    Research on the Technology of ANN for SR and Application in Information Security

  8. 信息安全中的加密与解密技术利用CMOS信息进行加密的方法与实现

    Encrypt & Crack Technology in Information Security Method and Practice of Using CMOS Information to Encrypt

  9. 基于PKI体系的信息安全技术研究

    Research on Information Security Technology Based on PKI System

  10. 随着Internet技术的应用,基于Web的PDM系统得到了很大的发展,在基于Internet的应用环境中,信息安全性显得尤为重要。

    With the application of Internet , PDM system based on Web makes a great progress , and in the environment based on Internet , information security is very important .

  11. 网络层安全体系框架IPSec(IPsecurity)在报文信息安全模型基础上提供了基于密钥的报文源验证服务。

    Existing network security framework IP Security ( IPSec ) proposed for information security model offers data origin authentication service based on common keys in IP layer .

  12. 针对TEMPESTATTACK对计算机信息安全构成的威胁,建立了基本的电磁辐射模型。

    TEMPEST ATTACK threat on the computer information security is analyzed . The fundamental electromagnetic radiation models are set up .

  13. VxD在企业网信息安全防护系统中的应用

    Application of VxD in information security defending system based on Intranet

  14. 公钥基础设施(PKI)是现代网络信息安全领域中的一门新兴主流安全技术。

    The public key infrastructure ( PKI ) is an emerging mainstream security technology in the modern network information security domain .

  15. 提出了特种保障的概念,分析了国家信息安全的危害因素,主要有CPU隐含指令、后门、恶意软硬件等。

    Some factors that would endanger the national information security were analyzed . They included CPU hiding instructions , trapdoor and vicious software / hardware , etc.

  16. 在这种情况下,在PKI的基础上,发展起来了一种新的信息安全基础设施&权限管理基础设施PMI。

    Under this condition , as a new kind of information security infrastructure , Privilege Management Infrastructure ( PMI ) is developed .

  17. 将真随机数发生器开发成IP(Intellectualproperty),就可以使得它作为SoC(System-on-Chip)信息安全设计的一个设计元素,为各加密模块所用。

    TRNG can be a element of the SoC ( System-on-Chip ) design by developing it as a IP ( Intellectual Property ) which is used by the encryption modules .

  18. 信息安全工具包正是解决信息安全问题的基础,我们基于面向对象技术开发了自主版权的信息安全工具包CIST(ChineseInformationSecurityToolkit),它能够提供各种信息安全服务。

    Information security toolkit is just the key to these information security problems . Based on object-oriented techniques we developed self-copyrighted Chinese Information Security Toolkit ( CIST ), which provides various information security services .

  19. 根据上述成果,实现了一个信息安全管理平台,以基于DCE的网络安全模型作为安全中间件;

    Therefore , one platform can be integrated to manage the information security with the DCE-based network safety middle-unit .

  20. 在信息安全领域中侧沟道泄漏信息(SCI)攻击可以利用加密算法的特点和硬件模块的泄漏信息分析出加密硬件中的关键信息。

    Side channel information could be used to analysis the key information according to leakage information depending on the operation of cryptography algorithm and its hardware .

  21. PKI是目前公认的在大规模、开放网络环境下解决信息安全问题最可行、最有效的一种办法。

    Public Key Infrastructure ( PKI ) technology based on public-key cryptography theory is considered to be the most feasible and most effective method to solve information security problems in large and open networking environment .

  22. 目前,公钥基础设施(PKI,PublicKeyInfrastructure)已成为网络安全建设的基础与核心,是电子商务安全实施的基本保障,对PKI技术的研究和开发已成为当前信息安全领域的热点。

    Public Key Infrastructure ( PKI ) is the foundation and core of network security construction now . It also becomes the basic guarantee of electronic business . Research and development of PKI becomes the hot topic in the field of information security nowadays .

  23. 然后剖析了PKI的体系组成和PKI的管理,根据PKI技术特点,论文最后详细探讨PKI技术在电子政务系统信息安全方面的各种应用。

    Then analyzes the PKI system composition and the PKI management ; according to the characteristic of PKI technology , the paper finally discusses the application with PKI technology in all aspects in e-government system information security .

  24. 空间信息安全目前主要依赖操作系统、数据库等支撑环境固有的安全保护机制,,但GIS中空间信息的复杂性使得这些固有的安全保护机制在管理上不便、工作量大,并且不能满足安全需要。

    Currently spatial information security mainly relies on the built-in security-protecting mechanism of the supporting environment , such as operating system , database and so on . But the complexity of the spatial information of GIS makes the built-in security-protecting mechanism hard to be managed and can cause great workloads ;

  25. 首先介绍了电子政务信息安全的需要,而在各种网络信息安全技术中只有利用PKI体系的管理密钥和证书技术才可以建立一个安全的电子政务环境。

    This article first introduces the need of it in e-government information security , and only with the PKI system management dense key and the certificate technology in all kinds of network information security technology may establish a safe E-government environment ;

  26. 信息安全管理体系标准ISO17799

    Information security management system standard ISO 17799

  27. 作为信息安全基础的公开密钥基础设施(PKI)已经成为当今计算机安全领域研究的热点问题,它为安全服务提供基础框架,并逐渐成为整个安全体系结构的核心部分。

    As an infrastructure of the information security , Public Key Infrastructure ( PKI ) is a hot topic in the research field of computer security which is the basic framework of secure service and becoming the nuclear part of the whole secure architecture .

  28. 在概述信息安全策略的概念、组成要素、框架的基础上,运用O-Telos语言描述信息安全策略,形成信息安全策略知识库。

    Based on summarizing the concepts , elements and structure of information security policy , O-Telos language is used to describe information security policy and an information security policy knowledge base is thus formed .

  29. 强化安全审计实现网络与信息安全的闭环管理

    Consolidating Security Auditing to Drive Network and Information Security Closed-loop Management

  30. 电力行业信息安全体系结构初探

    The early study of information security architecture of electric power industry