• Some outsourcing storage systems also provide additional services to ensure data confidentiality and integrity of data transmission.

    有的外包存储系统提供额外的服务确保数据保密性数据传输完整性

    youdao

  • It is required that Peers in P2P network inter-authenticate to each other and establish secure tunnels between them to ensure the data confidentiality and integrity when in transit.

    要求对等节点之间能够相互认证以及对等节点之间建立安全隧道保证数据在传输过程中的完整性机密性

    youdao

  • Therefore, we can use this to build up a cipher text communication pipe for data transferring between clients and servers of database systems to preserve data confidentiality and integrity.

    因而可以客户端服务器之间构建条透明的安全通道,从而保证网络传输过程中数据保密性完整性

    youdao

  • Some form of encryption is needed to protect confidentiality and integrity of data.

    需要某种形式加密技术保护数据的机密性完整性

    youdao

  • SSL protocols support authentication, data integrity, and confidentiality.

    SSL协议支持认证数据完整性机密性

    youdao

  • This security enhancement feature supports data confidentiality and data integrity.

    改进安全特性支持数据保密性数据完整性

    youdao

  • SSL ensures confidentiality and integrity of data transmission over the network.

    SSL可以确保网络上传输数据秘密性完整性

    youdao

  • SPKM provides authentication, key establishment, data integrity, and data confidentiality in an online distributed application environment using a public key infrastructure.

    SPKM使用公钥基础设施一个联机分布式应用程序环境下提供身份验证密钥设立数据完整性数据机密性

    youdao

  • The steps taken by the data collector to ensure the confidentiality, integrity and quality of the data.

    数据收集者确保数据保密完整质量采取手段。

    youdao

  • The architecture of the solution includes the ability for them to leverage both XML Digital Signature and XML Encryption to address authentication, data integrity, and data confidentiality.

    解决方案体系结构包括使用XML数字签名(XML Digital Signature) XML加密(XML Encryption)满足验证数据完整性和数据机密性的需求。

    youdao

  • Some consumers of a service have greater needs than other consumers of the same service for data confidentiality, integrity, and nonrepudiation.

    保密性完整性不可否认性来说一些服务消费者相同服务其他消费者更高的要求

    youdao

  • Security: Ensure that the component or system maintains user confidentiality, data integrity, and authorized permissions.

    安全确保组件系统保证用户信息机密性数据完整性授权的允许性。

    youdao

  • We have spoken about concerns with the data and Confidentiality, Integrity and Availability - but what if your service provider goes bust?

    我们已经数据的机密完整性可用性问题——如果服务提供商倒闭又该怎么办?

    youdao

  • As for data security, data confidentiality, availability and integrity.

    至于数据安全,是指数据的保密性可用性完整性。

    youdao

  • The air interface security technologies for the protection of data confidentiality and data integrity in 3g are discussed.

    讨论了第3移动通信系统空中接口安全保护技术,包括数据机密性保护、数据完整性保护。

    youdao

  • Information security not only includes guaranteeing the security of locally stored data, but also the confidentiality and integrity of data in the process of communication.

    信息安全除了保证数据在本地存储过程中的安全,应该满足网络传输过程中的保密性完整性要求。

    youdao

  • Database security definitions mainly refers to data and information to ensure database integrity, confidentiality and availability.

    数据库安全定义主要保证数据库数据信息完整性保密性可用性

    youdao

  • SSL protects against data being altered (data integrity), protects a user's identity (confidentiality), and assures that data originates from the expected client (authentication).

    SSL保护数据不被改变(数据完整性),保护用户标识(保密性),保证数据来自预期客户(身份验证)。

    youdao

  • A secure network information system should ensure integrity, confidentiality and non-reputation of the transmitted data.

    一个安全网络信息系统应当确保所传输信息的完整性保密性、不可否认性等。

    youdao

  • IPSEC is a standard, can extend the mechanism for IP and upper agreement provides data confidentiality, integrity, and data safety identity authentication services.

    IPSEC一种标准的、扩充机制IP上层协议提供了数据机密性完整性数据源身份认证等安全服务

    youdao

  • The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.

    对于信息系统安全性一般包括:数据完整性、数据保密性、身份确认认证、访问控制不可否认性等几个方面。

    youdao

  • Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i. e. confidentiality protection and integrity protection.

    鉴于存储器数据主要驻留场所,因此,防范攻击首要是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密完整性保护。

    youdao

  • Confidentiality protection ensures that the data can't be understudied by attackers and integrity protection ensures that the data can't be tampered.

    存储器的机密性保证数据攻击者窃取,完整性保证了数据不攻击者篡改。

    youdao

  • Confidentiality protection ensures that the data can't be understudied by attackers and integrity protection ensures that the data can't be tampered.

    存储器的机密性保证数据攻击者窃取,完整性保证了数据不攻击者篡改。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定