信息安全术语中英文词条对照表_第1页
信息安全术语中英文词条对照表_第2页
信息安全术语中英文词条对照表_第3页
信息安全术语中英文词条对照表_第4页
信息安全术语中英文词条对照表_第5页
已阅读5页,还剩22页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、信息安全术语中英文词条对照表 序号中文词条 英文词条 1. N)中继 (N) -re I ay 2. abstract syntax 3. /存取 access 4. access controI 5. access controI certificate 6. Access controI Dec i s i on Funct i on (ADF) 7. Access controI Dec i s i on Informat i on(AD I) Access controI Enforcement Funct i on (AEF) access control i nformation

2、access controI Ii st 8. 9. 10. 11. access controI mechan i sms 12. access controI poI icy 13. access controI poI icy ruIes access controI token access I i st 14. 15. 16. access per i od 17. access request access type accred itat ion act i ve threat 18. 19. /审批 20. 21. act ive wiretapp i ng 22. a I a

3、rm processor 23. appIi cat i on I eve I f i rewaI I 24. Assets 25. ass i gnment 26. assoc i at i on secur i ty state 27. /保证 assurance 28. asymmetr i c authent i cation method 29. asymmetr i c cryptograph i c a Igor ithm 30. asymmetr i c cryptograph i c techn i que 31. asymmetr i c enc i pherment sy

4、stem 32. asymmetr i c key pa i r 33. asymmetr i c s i gnature system 34. attr i bute 35. AARL) Attr i bute Author i ty Revocation List (AARL) 36. AA) Attribute Authority(AA) 37. Attribute cert ificate 38. ACR)L Attr i bute Cert ificate Revocation List (ACRL) 39. /审核 aud i t 40. audit ana Iyzer 41. a

5、ud it arch i ve 42. aud i t author ity 43. aud i t d i spatcher 44. aud i t prov i der 45. aud i t recorder 46. aud i t tra i I 47. aud i t tra i I col Iector 48. aud i t tra i I examiner 49. /认证 authent i cat i on 50. authenticat ion cert ificate 51. authentication data 52. authent i cat i on i nfo

6、rmat i on 53. authent icat ion i ni t i ator 54. authentication token (token) 55. authent i cator 56. author i zed user 57. /机构 Author ity 58. author ity cert ificate 59. author i zat i on 60. author ized admin i strator 61. automated secur ity monitor ing 62. ava i Iab i I ity 63. ava i labi I ity

7、of data 64. backup procedure 65. base CRL 66. /块 b I ock 67. bIock cha i n i ng 68. bounds check ing 69. brevity I i sts 70. brows i ng 71. CA证书 CA-cert i f i cate 72. caI I back 73. /能力 capab i I ity 74. cert i f i cate 75. cert i f i cate poI i cy 76. certificate ser i a number 77. cert i f i cate

8、 user 78. cert i f i cate vaI i dat i on 79. cert i f i cat i on 80. cert i f i cation author i ty 81. CAR)L Cert i f i cation Author i ty Revocat i on L i st (CARL) 82. certification path 83. /通道 channeI 84. c i phertext 85 claim authent icat on i nformation 86. cIearance 87. cI eartext 88. 89. col

9、 I is ion res i stant hash-function combination firewall 90. common grounding system 91. communi cat ions secur i ty 92. compartmentaI i zat i on 93. /组件/部 component 94. compromi se 95. compromi sed ev idenee 96. compromi s ing emanat i ons 97. computer system 98. conceaIment system 99. configuratio

10、n management 100. conf i guration management system 101. connect ion integr ity without recovery 102. connect i on I ess conf i dent i a I ity 103. connect i on I ess i ntegr i ty 104. connectivity 105. cont i ngency pI an 106. controI zone 107. controI IabIe i sol at i on 108. controI Ied access 10

11、9. controI Ied access i b i Iity 110. controI Ied shar i ng 111. cost-r i sk ana lysis 112. court termeasure 113. covert channel 114. covert storage channel 115. covert timi ng channeI 116. credent i a Is 117. CRL分发点 CRL d i stri bution po i nt 118. cross-taIk 119. cryptana lysis 120. crypto-aIgor i

12、thm 121. cryptograph i c cha i n i ng 122. cryptograph i c check funct ion 123. cryptograph i c check vaIue 124. cryptograph i c synchronizat i on 125. cryptographic system; cryptosystem 126. cryptography 127. crypto-operat i on 128. crypto-secur ity 129. data conf i dent i a I i ty 130. data contam

13、i nation 131. data integr i ty 132. data or igin authent ication 133. data str i ng (data) 134. data unit integr ity 135. /脱密 dec i pherment 136. degradat i on 137. de Iegat i on 138. de Iegation path 139. de I i very author ity 140. delta-CRL(dCRL) 141. denial of service 142. /依赖性 dependency 143. d

14、igital signature 144. D i rectory Informat i on Base 145. D i rectory Informat i on Tree 146. D i rectory system Agent 147. D i rectory user Agent 148. d i stingu i shed name 149. d i st i ngu i sh i ng i dent i f i er 150. Enc i pherment、 enc i pher、 151. encrypt i on a Igor ithm 152. end entity 15

15、3. end system 154. EARL) End-ent i ty Attr i bute Cert i f i cate Revocat i on L i st 155. EPRL) End-ent i ty Pub Ii c-key Certificate Revocat i on L i st 156. end-to-end enc i pherment 157. entity authentication 158. env i ronmentaI var i abIes 159. evaIuation assurance level (EAL) 160. evaIuat i o

16、n author i ty 161. evaIuat i on scheme 162. event d i scr imi nator 163. ev i dence 164. ev i dence generator 165. ev i dence requester 166. evidence subject 167. evidence user 16& ev i dence ver i f i er 169. exchange authent i cation i nformat i on 170. IT实体 externa I IT ent i ty 171. externaI sec

17、ur ity audit 172. fa i Iure access 173. fa i Iure controI 174. fault to I erance 175. features 176. feedback buffer 177. fetch protection 178. fi le protect ion 179. f i rewaI I 180. f i rmware 181. forma I proof 182. forma I top-level spec i f i cat i on 183. forma I ver i f i cat i on 184. CRL ful

18、I CRL 185. granuI ar ity 186. ground gr i d 187. ground res i stance 188. grounding 189. grounding eI ectrode 190. ground i ng system 191. handshak i ng procedure 192. (哈希函 hash funct i on 193. hash-code 194. hash-funct i on i dent i f i er 195. h i de 196. ho Ider 197. Hos t 198. host unit 199. i d

19、ent i f i cat i on 200. i dentification data 201. immunity(to a di sturbanee) 202. impersonat i on 203. impr i nt 204. inter Ieaving attack 205. i ncompIete parameter check ing 206. indi rect attack 207. CRL indirect CRL (iCRL) 208. i nformation system secur ity 209. i nformation system secur ity ma

20、nagement architecture 210. informat i on techno Iogy equ i pment 211. init i a I encod i ng ruIes 212. initiali zat i on vaIue 213. init i ator 214. i ntegr ity 215. i nterd i ct i on 216. inter Ieaving attack 217. internal communication channel 218. internal secur ity audit 219. i so I at i on 220.

21、 key 221. key agreement 222. key conf i rmat i on 223. key controI 224. key d i str i but i on centre 225. key management 226. key transI at i on centre 227. I abe I 228. IabeI of subject and object 229. I east pr i v i Iege 230. Ii ghtning eIectromagnetic puIse 231. Ii ghtning protect i on zones 23

22、2. Iimi ted access 233. Ii nk encrypt i on 234. Ii nk-by-li nk enc i pherment 235. I oca I system env i ronment 236. IoophoIe 237. ma Ifunct i on 238. Management Informat i on 239. mandatory access controI 240. Masquerade 241. measurement 242. message 243. message authenticat ion code 244. mimick i

23、ng 245. monitor (monitor author ity) 246. monitor ing 247. multi I eve I dev i ce 248. multi level secure 249. multiple access r i ghts terminal 250. mutuaI authent i cat i on 251. n位分组密码 n-bit bIock c i pher 252. network entity 253. network Iayer 254. network protocoI 255. network protocoI data uni

24、t 256. network re I ay 257. network secur i ty 258. network serv i ce 259. network trusted computed base 260. non-repud i at i on 261. non-repudiation exchange 262. non-repud i at i on i nformat i on 263. /抗创 建 non-repudiation of creation 264. /抗交 付 non-repudiation of de I i very 265. non-repudiatio

25、n of origin 266. /抗接 收 non-repudiation of rece i pt 267. /抗发 送 non-repudiation of send i ng 268. /抗提 交 non-repudiation of submi ss i on 269. non-repudiat ion poI icy 270. non-repudiation serv i ce 271. notar i zat i on 272. notar i zation token 273. /公证者 notary 274. notary (notary author i ty) 275.

26、NRD权标 /NRD令 NRD token 276. NR0权标 NRO token 277. NRS权标 NRS token 278. NRT权标 NRT token 279. object 280. object method 281. object reuse 282. off-1 i ne authent i cat i on cert i f i cate 283. off I i ne crypto-operation 284. one-way function 285. one-way hash function 286. on-1 i ne autherrt i cat i o

27、n cert i f i cate 287. on Ii ne crypto-operat i on 288. open system 289. organi zat ionaI secur i ty pol icies 290. or iginator 291. 0SI管理 OS I Management 292. out-of-band 293. package 294. packet filter f i rewaI I 295. padd i ng 296. pa i r wi se key 297. pass i ve threat 298. pass i ve wi retapp

28、i ng 299. password 300. password dialog 301. peer-entity authenticat i on 302. penetrat i on 303. penetration profi le 304. penetration s i gnature 305. penetration testing 306. person i dent i f i cat i on 307. persona I secur i ty 308. phys i caI secur i ty 309. plain text 310. poI i cy 311. poI i

29、 cy mapp i ng 312. port 313. presentat ion context 314. presentat ion data vaIue 315. presentat i on-ent i ty 316. pre-s i gnature 317. pr i nc i pa I 318. principle of Ieast pr ivi lege 319. pr i or ity of serv i ce 320. pr i vacy 321. pr i vacy transformation 322. pr i vate dec i pherment key 323.

30、 pr i vate key 324. pr i vate s i gnature key 325. pr i v i Ieged i nstruct i ons 326. proceduraI secur ity 327. product 328. proof 329. protecting presentat ion context 330. protect i ng transfer syntax 331. protection mapp ing 332. protect i on prof i Ie 333. protect i on r i ng 334. protect i ve

31、earthing 335. protocoI data unit 336. protoco I imp Iementat i on conformance statement 337. proxy server pseudo-fI aw 338. 339. pub I i c enc i pherment key 340. PKl) Pub I i c Key Infrastructure (PKI) 341. pub I i c key 342. 证 (书 pub I i c key cert i f i cate (cert i f i cate) 343. pub I i c key i

32、 nformation 344. pub I i c ver i f i cation key 345. purging 346. Random number Randomized Rea I open system 347. 348. 349. /接收者 Rec i p i ent 350. Recovery procedure 351. Redundancy 352. reference vaI i dation mechanism 353. 354. ref i nement ref Iect i on attack 355. ref Iect i on protection 356.

33、re I ay system relying party rep I ay attack 357. 358. 359. repud i at i on 360. resource a I I ocation 361. restr i cted area 362. ADI reta i ned AD I 363. reveaI 364. revocat i on certificate 365. revocation I i st cert i f i cate 366. risk 367. r i sk ana lysis 368. r i sk management 369. ro I e

34、370. roIe ass i gnment cert i f i cate 371. roIe spec i f i cation certificate 372. roI I back 373. root 374. /轮函数 round-funct i on 375. rout i ng 376. routing controI 377. ruIe-based secur ity poI icy 378. SA属性 SAattr i butes 379. safety protection earth 380. /密封 sea I 381. secret key 382. secure c

35、onf i gurat i on management 383. SENV) secure enveI ope 384. secure i nteract i on ruIes 385. secure operat ing system 386. secure path 387. secure state 388. secur ity administrator 389. secur ity a I arm 390. secur ity a I arm administrator 391. secur ity assoc i at i on 392. secur ity assurance 3

36、93. secur ity attr i bute 394. secur ity aud i t 395. secur ity aud i t message 396. secur ity aud i t record 397. secur ity aud i t tra i I 398. secur ity aud i tor 399. secur i ty author ity 400. secur ity cert i f i cate 401. secur ity cert i f i cate cha i n 402. secur ity communi cat i on funct

37、 i on 403. secur ity controI information 404. secur ity doma i n 405. secur ity doma i n author ity 406. secur ity eIement 407. secur ity exchange 408. secur ity exchange function 409. secur ity exchange item 410. secur ity features 411. secur ity f i Iter 412. secur ity function 413. secur ity func

38、tion poI icy 414. secur i ty i nformat i on 415. secur ity kerne I 416. secur ity level 417. Secur ity Management Information Base 418. secur ity objective 419. secur ity per imeter 420. secur ity pol icy 421. secur i ty recovery 422. secur i ty re I ationship 423. secur i ty report 424. secur i ty

39、requ i rements 425. secur i ty ruIes 426. secur i ty spec i f i cat i ons 427. secur i ty state 428. secur i ty target 429. secur ity testing 430. secur i ty transformation 431. Secur ity-related event 432. sens itive i nformat ion 433. sensitivity 434. sens itivity label 435. shield 436. short i nt

40、errupt i on 437. secur i ty serv i ce 438. simple authent i cat i on 439. s i ng Ie-i tem-bound secur i ty assoc i at i on 440. single-1 eve I dev i ce 441. SOF-med i um 442. Source of Author ity (SOA) 443. spoof i ng 444. stand-by mode 、 sIeep-mode 445. strong authent i cat i on 446. subject 447. superv i sor state 448. symmetr i c authent i cat i on method 449. symmetr i c cryptograph i c a Igor i thm 450. symmetr i c

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

最新文档

评论

0/150

提交评论