• In this model confidentiality and integrity may also be required.

    模型中,可能需要保密性完整性

    youdao

  • End-to-end authentication, confidentiality and Integrity required.

    端到端身份验证需要机密性完整性

    youdao

  • Connection option specifies whether confidentiality and integrity is used.

    连接选项指定是否使用保密性完整性

    youdao

  • SSL ensures confidentiality and integrity of data transmission over the network.

    SSL可以确保网络上传输数据秘密性完整性

    youdao

  • Some form of encryption is needed to protect confidentiality and integrity of data.

    需要某种形式加密技术保护数据的机密性完整性

    youdao

  • This risk can manifest itself financially in a similar manner as confidentiality and integrity.

    这种风险可以机密性完整性类似的方式从财政上表明自己

    youdao

  • RSA_TLS encryption protects the confidentiality and integrity of network packets as they pass between the client and the server.

    网络数据包客户端服务器之间进行传输时,使用RSA_TLS加密可保护它们保密性完整性

    youdao

  • By controlling the user's access to information and resource, access control ensures the confidentiality and integrity of system.

    它通过控制用户系统信息资源访问,来达到系统信息资源保密性完整性

    youdao

  • However, in order to protect the confidentiality and integrity of IBM's relationship with our customers, fictitious names will be used.

    然而为了保护IBM我们客户关系机密性完整性,我们使用虚构的公司

    youdao

  • Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.

    维护机密性完整性典型解决方案涉及使用现有安全协议加密算法。

    youdao

  • Some outsourcing storage systems also provide additional services to ensure data confidentiality and integrity of data transmission.

    有的外包存储系统提供额外的服务确保数据保密性数据传输完整性

    youdao

  • However, in order to protect the confidentiality and integrity of the relationship of IBM with the customer, fictitious names will be used.

    然而为了保护IBM客户之间关系机密性完好性,我们使用虚构公司

    youdao

  • However, in order to protect the confidentiality and integrity of the vendor's relationship with the customer, fictitious names will be used.

    然而为了不公开、不损害供应商客户关系,我们使用虚构的公司

    youdao

  • As a way to defend information's confidentiality and integrity, access control takes a quite important role in military system and commercial system.

    作为保护信息资源机密完整性重要手段访问控制保密系统商业系统中占据了重要地位

    youdao

  • While IPSec is providing confidentiality and integrity to our service, the simple HTTP Basic authentication header is providing identification and authentication.

    IPSec我们服务提供机密性完整性的同时,简单HTTP基本身份验证Header可以提供标识和身份验证。

    youdao

  • Permission checks, confidentiality and integrity requirements, and business Activity Monitoring (BAM) logging for visibility into how the business processes perform (KPIs).

    这样的例子有权限检查保密性完整性需求以及了解业务流程执行情况(KPI)的业务活动监控(BAM)日志

    youdao

  • Create a secure connection to the service that encrypts and authenticates, so you at least have a way to get confidentiality and integrity for the connection to the service.

    创建服务安全连接它会进行加密验证这样至少一种方法服务连接保证机密性完整性

    youdao

  • Confidentiality and integrity are very important to LDAP services, often implemented with encryption and message digest techniques. LDAP does not support these two well.

    数据通信的机密完整性保护LDAP目录服务具有重要意义,通常采用数据加密消息摘要技术来实现,LDAP自身对此的支持太完善。

    youdao

  • Information security not only includes guaranteeing the security of locally stored data, but also the confidentiality and integrity of data in the process of communication.

    信息安全除了保证数据在本地存储过程中的安全,应该满足网络传输过程中的保密性完整性要求。

    youdao

  • It is certainly possible that confidentiality and integrity are protected, but an attacker could still cause resources to be less available than required or not available at all.

    当然可能保密性完整性得到保护的情况下,入侵者仍然可能导致资源需要时可用降低根本不可用。

    youdao

  • Therefore, we can use this to build up a cipher text communication pipe for data transferring between clients and servers of database systems to preserve data confidentiality and integrity.

    因而可以客户端服务器之间构建条透明的安全通道,从而保证网络传输过程中数据保密性完整性

    youdao

  • Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.

    实现信息系统安全目标,需要系统能够提供相关安全服务身份标识认证服务、授权访问控制服务、非否认服务、机密性服务、完整性服务。

    youdao

  • It is imperative that this connection is secure to protect the integrity and confidentiality of messages being exchanged between these components.

    这种连接安全性强制性的,保证这些组件之间交换消息完整性机密性

    youdao

  • As part of the information assurance policy, confidentiality, integrity and availability must be in place.

    作为信息保证政策一部分,必须具有机密性完整性可用性

    youdao

  • These institutions must guarantee that the integrity, confidentiality, and availability of electronic health information that they collect, maintain, use, and transmit is protected.

    这些机构必须保证他们收集维护使用传输电子健康信息完整性机密性和可用性

    youdao

  • In this lifecycle the starting point is the business requirements in terms of not only confidentiality, integrity and availability but also effectiveness, efficiency, compliance and reliability.

    生命周期中,起始不仅仅机密性完整性可用性方面业务需求还是包括有效性效率和可靠性方面的需求,。

    youdao

  • It is a set of programming interfaces that abstracts identity authentication, message origin authentication and integrity, and message confidentiality.

    身份验证消息来源验证完整性以及消息机密性进行抽象编程接口集合。

    youdao

  • This security enhancement feature supports data confidentiality and data integrity.

    改进安全特性支持数据保密性数据完整性

    youdao

  • SSL protocols support authentication, data integrity, and confidentiality.

    SSL协议支持认证数据完整性机密性

    youdao

  • SSL protocols support authentication, data integrity, and confidentiality.

    SSL协议支持认证数据完整性机密性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定