




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、信息安全术语中英文词条对照表 序号中文词条 英文词条 1. N)中继 (N) -re I ay 2. abstract syntax 3. /存取 access 4. access controI 5. access controI certificate 6. Access controI Dec i s i on Funct i on (ADF) 7. Access controI Dec i s i on Informat i on(AD I) Access controI Enforcement Funct i on (AEF) access control i nformation
2、access controI Ii st 8. 9. 10. 11. access controI mechan i sms 12. access controI poI icy 13. access controI poI icy ruIes access controI token access I i st 14. 15. 16. access per i od 17. access request access type accred itat ion act i ve threat 18. 19. /审批 20. 21. act ive wiretapp i ng 22. a I a
3、rm processor 23. appIi cat i on I eve I f i rewaI I 24. Assets 25. ass i gnment 26. assoc i at i on secur i ty state 27. /保证 assurance 28. asymmetr i c authent i cation method 29. asymmetr i c cryptograph i c a Igor ithm 30. asymmetr i c cryptograph i c techn i que 31. asymmetr i c enc i pherment sy
4、stem 32. asymmetr i c key pa i r 33. asymmetr i c s i gnature system 34. attr i bute 35. AARL) Attr i bute Author i ty Revocation List (AARL) 36. AA) Attribute Authority(AA) 37. Attribute cert ificate 38. ACR)L Attr i bute Cert ificate Revocation List (ACRL) 39. /审核 aud i t 40. audit ana Iyzer 41. a
5、ud it arch i ve 42. aud i t author ity 43. aud i t d i spatcher 44. aud i t prov i der 45. aud i t recorder 46. aud i t tra i I 47. aud i t tra i I col Iector 48. aud i t tra i I examiner 49. /认证 authent i cat i on 50. authenticat ion cert ificate 51. authentication data 52. authent i cat i on i nfo
6、rmat i on 53. authent icat ion i ni t i ator 54. authentication token (token) 55. authent i cator 56. author i zed user 57. /机构 Author ity 58. author ity cert ificate 59. author i zat i on 60. author ized admin i strator 61. automated secur ity monitor ing 62. ava i Iab i I ity 63. ava i labi I ity
7、of data 64. backup procedure 65. base CRL 66. /块 b I ock 67. bIock cha i n i ng 68. bounds check ing 69. brevity I i sts 70. brows i ng 71. CA证书 CA-cert i f i cate 72. caI I back 73. /能力 capab i I ity 74. cert i f i cate 75. cert i f i cate poI i cy 76. certificate ser i a number 77. cert i f i cate
8、 user 78. cert i f i cate vaI i dat i on 79. cert i f i cat i on 80. cert i f i cation author i ty 81. CAR)L Cert i f i cation Author i ty Revocat i on L i st (CARL) 82. certification path 83. /通道 channeI 84. c i phertext 85 claim authent icat on i nformation 86. cIearance 87. cI eartext 88. 89. col
9、 I is ion res i stant hash-function combination firewall 90. common grounding system 91. communi cat ions secur i ty 92. compartmentaI i zat i on 93. /组件/部 component 94. compromi se 95. compromi sed ev idenee 96. compromi s ing emanat i ons 97. computer system 98. conceaIment system 99. configuratio
10、n management 100. conf i guration management system 101. connect ion integr ity without recovery 102. connect i on I ess conf i dent i a I ity 103. connect i on I ess i ntegr i ty 104. connectivity 105. cont i ngency pI an 106. controI zone 107. controI IabIe i sol at i on 108. controI Ied access 10
11、9. controI Ied access i b i Iity 110. controI Ied shar i ng 111. cost-r i sk ana lysis 112. court termeasure 113. covert channel 114. covert storage channel 115. covert timi ng channeI 116. credent i a Is 117. CRL分发点 CRL d i stri bution po i nt 118. cross-taIk 119. cryptana lysis 120. crypto-aIgor i
12、thm 121. cryptograph i c cha i n i ng 122. cryptograph i c check funct ion 123. cryptograph i c check vaIue 124. cryptograph i c synchronizat i on 125. cryptographic system; cryptosystem 126. cryptography 127. crypto-operat i on 128. crypto-secur ity 129. data conf i dent i a I i ty 130. data contam
13、i nation 131. data integr i ty 132. data or igin authent ication 133. data str i ng (data) 134. data unit integr ity 135. /脱密 dec i pherment 136. degradat i on 137. de Iegat i on 138. de Iegation path 139. de I i very author ity 140. delta-CRL(dCRL) 141. denial of service 142. /依赖性 dependency 143. d
14、igital signature 144. D i rectory Informat i on Base 145. D i rectory Informat i on Tree 146. D i rectory system Agent 147. D i rectory user Agent 148. d i stingu i shed name 149. d i st i ngu i sh i ng i dent i f i er 150. Enc i pherment、 enc i pher、 151. encrypt i on a Igor ithm 152. end entity 15
15、3. end system 154. EARL) End-ent i ty Attr i bute Cert i f i cate Revocat i on L i st 155. EPRL) End-ent i ty Pub Ii c-key Certificate Revocat i on L i st 156. end-to-end enc i pherment 157. entity authentication 158. env i ronmentaI var i abIes 159. evaIuation assurance level (EAL) 160. evaIuat i o
16、n author i ty 161. evaIuat i on scheme 162. event d i scr imi nator 163. ev i dence 164. ev i dence generator 165. ev i dence requester 166. evidence subject 167. evidence user 16& ev i dence ver i f i er 169. exchange authent i cation i nformat i on 170. IT实体 externa I IT ent i ty 171. externaI sec
17、ur ity audit 172. fa i Iure access 173. fa i Iure controI 174. fault to I erance 175. features 176. feedback buffer 177. fetch protection 178. fi le protect ion 179. f i rewaI I 180. f i rmware 181. forma I proof 182. forma I top-level spec i f i cat i on 183. forma I ver i f i cat i on 184. CRL ful
18、I CRL 185. granuI ar ity 186. ground gr i d 187. ground res i stance 188. grounding 189. grounding eI ectrode 190. ground i ng system 191. handshak i ng procedure 192. (哈希函 hash funct i on 193. hash-code 194. hash-funct i on i dent i f i er 195. h i de 196. ho Ider 197. Hos t 198. host unit 199. i d
19、ent i f i cat i on 200. i dentification data 201. immunity(to a di sturbanee) 202. impersonat i on 203. impr i nt 204. inter Ieaving attack 205. i ncompIete parameter check ing 206. indi rect attack 207. CRL indirect CRL (iCRL) 208. i nformation system secur ity 209. i nformation system secur ity ma
20、nagement architecture 210. informat i on techno Iogy equ i pment 211. init i a I encod i ng ruIes 212. initiali zat i on vaIue 213. init i ator 214. i ntegr ity 215. i nterd i ct i on 216. inter Ieaving attack 217. internal communication channel 218. internal secur ity audit 219. i so I at i on 220.
21、 key 221. key agreement 222. key conf i rmat i on 223. key controI 224. key d i str i but i on centre 225. key management 226. key transI at i on centre 227. I abe I 228. IabeI of subject and object 229. I east pr i v i Iege 230. Ii ghtning eIectromagnetic puIse 231. Ii ghtning protect i on zones 23
22、2. Iimi ted access 233. Ii nk encrypt i on 234. Ii nk-by-li nk enc i pherment 235. I oca I system env i ronment 236. IoophoIe 237. ma Ifunct i on 238. Management Informat i on 239. mandatory access controI 240. Masquerade 241. measurement 242. message 243. message authenticat ion code 244. mimick i
23、ng 245. monitor (monitor author ity) 246. monitor ing 247. multi I eve I dev i ce 248. multi level secure 249. multiple access r i ghts terminal 250. mutuaI authent i cat i on 251. n位分组密码 n-bit bIock c i pher 252. network entity 253. network Iayer 254. network protocoI 255. network protocoI data uni
24、t 256. network re I ay 257. network secur i ty 258. network serv i ce 259. network trusted computed base 260. non-repud i at i on 261. non-repudiation exchange 262. non-repud i at i on i nformat i on 263. /抗创 建 non-repudiation of creation 264. /抗交 付 non-repudiation of de I i very 265. non-repudiatio
25、n of origin 266. /抗接 收 non-repudiation of rece i pt 267. /抗发 送 non-repudiation of send i ng 268. /抗提 交 non-repudiation of submi ss i on 269. non-repudiat ion poI icy 270. non-repudiation serv i ce 271. notar i zat i on 272. notar i zation token 273. /公证者 notary 274. notary (notary author i ty) 275.
26、NRD权标 /NRD令 NRD token 276. NR0权标 NRO token 277. NRS权标 NRS token 278. NRT权标 NRT token 279. object 280. object method 281. object reuse 282. off-1 i ne authent i cat i on cert i f i cate 283. off I i ne crypto-operation 284. one-way function 285. one-way hash function 286. on-1 i ne autherrt i cat i o
27、n cert i f i cate 287. on Ii ne crypto-operat i on 288. open system 289. organi zat ionaI secur i ty pol icies 290. or iginator 291. 0SI管理 OS I Management 292. out-of-band 293. package 294. packet filter f i rewaI I 295. padd i ng 296. pa i r wi se key 297. pass i ve threat 298. pass i ve wi retapp
28、i ng 299. password 300. password dialog 301. peer-entity authenticat i on 302. penetrat i on 303. penetration profi le 304. penetration s i gnature 305. penetration testing 306. person i dent i f i cat i on 307. persona I secur i ty 308. phys i caI secur i ty 309. plain text 310. poI i cy 311. poI i
29、 cy mapp i ng 312. port 313. presentat ion context 314. presentat ion data vaIue 315. presentat i on-ent i ty 316. pre-s i gnature 317. pr i nc i pa I 318. principle of Ieast pr ivi lege 319. pr i or ity of serv i ce 320. pr i vacy 321. pr i vacy transformation 322. pr i vate dec i pherment key 323.
30、 pr i vate key 324. pr i vate s i gnature key 325. pr i v i Ieged i nstruct i ons 326. proceduraI secur ity 327. product 328. proof 329. protecting presentat ion context 330. protect i ng transfer syntax 331. protection mapp ing 332. protect i on prof i Ie 333. protect i on r i ng 334. protect i ve
31、earthing 335. protocoI data unit 336. protoco I imp Iementat i on conformance statement 337. proxy server pseudo-fI aw 338. 339. pub I i c enc i pherment key 340. PKl) Pub I i c Key Infrastructure (PKI) 341. pub I i c key 342. 证 (书 pub I i c key cert i f i cate (cert i f i cate) 343. pub I i c key i
32、 nformation 344. pub I i c ver i f i cation key 345. purging 346. Random number Randomized Rea I open system 347. 348. 349. /接收者 Rec i p i ent 350. Recovery procedure 351. Redundancy 352. reference vaI i dation mechanism 353. 354. ref i nement ref Iect i on attack 355. ref Iect i on protection 356.
33、re I ay system relying party rep I ay attack 357. 358. 359. repud i at i on 360. resource a I I ocation 361. restr i cted area 362. ADI reta i ned AD I 363. reveaI 364. revocat i on certificate 365. revocation I i st cert i f i cate 366. risk 367. r i sk ana lysis 368. r i sk management 369. ro I e
34、370. roIe ass i gnment cert i f i cate 371. roIe spec i f i cation certificate 372. roI I back 373. root 374. /轮函数 round-funct i on 375. rout i ng 376. routing controI 377. ruIe-based secur ity poI icy 378. SA属性 SAattr i butes 379. safety protection earth 380. /密封 sea I 381. secret key 382. secure c
35、onf i gurat i on management 383. SENV) secure enveI ope 384. secure i nteract i on ruIes 385. secure operat ing system 386. secure path 387. secure state 388. secur ity administrator 389. secur ity a I arm 390. secur ity a I arm administrator 391. secur ity assoc i at i on 392. secur ity assurance 3
36、93. secur ity attr i bute 394. secur ity aud i t 395. secur ity aud i t message 396. secur ity aud i t record 397. secur ity aud i t tra i I 398. secur ity aud i tor 399. secur i ty author ity 400. secur ity cert i f i cate 401. secur ity cert i f i cate cha i n 402. secur ity communi cat i on funct
37、 i on 403. secur ity controI information 404. secur ity doma i n 405. secur ity doma i n author ity 406. secur ity eIement 407. secur ity exchange 408. secur ity exchange function 409. secur ity exchange item 410. secur ity features 411. secur ity f i Iter 412. secur ity function 413. secur ity func
38、tion poI icy 414. secur i ty i nformat i on 415. secur ity kerne I 416. secur ity level 417. Secur ity Management Information Base 418. secur ity objective 419. secur ity per imeter 420. secur ity pol icy 421. secur i ty recovery 422. secur i ty re I ationship 423. secur i ty report 424. secur i ty
39、requ i rements 425. secur i ty ruIes 426. secur i ty spec i f i cat i ons 427. secur i ty state 428. secur i ty target 429. secur ity testing 430. secur i ty transformation 431. Secur ity-related event 432. sens itive i nformat ion 433. sensitivity 434. sens itivity label 435. shield 436. short i nt
40、errupt i on 437. secur i ty serv i ce 438. simple authent i cat i on 439. s i ng Ie-i tem-bound secur i ty assoc i at i on 440. single-1 eve I dev i ce 441. SOF-med i um 442. Source of Author ity (SOA) 443. spoof i ng 444. stand-by mode 、 sIeep-mode 445. strong authent i cat i on 446. subject 447. superv i sor state 448. symmetr i c authent i cat i on method 449. symmetr i c cryptograph i c a Igor i thm 450. symmetr i c
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 电动车电驱动系统效率优化考核试卷
- 探索管理学之旅
- 四川省宜宾市翠屏区二片区达标名校2025届初三化学试题第三次质量检测试题试卷含解析
- 天津市北辰区2025届第二学期初三期中考试数学试题含解析
- 山东省济南市槐荫区2025年数学四年级第二学期期末检测试题含解析
- 天津市北辰区2024-2025学年高三下学期第二次模拟考试(期中)历史试题含解析
- 辽宁科技学院《基础无机化学》2023-2024学年第二学期期末试卷
- 山东省济宁市金乡县2025年初三预测金卷(化学试题)含解析
- 天津电子信息职业技术学院《生物统计与试验设计实验》2023-2024学年第二学期期末试卷
- 武汉城市学院《名师科研导航中医学院》2023-2024学年第一学期期末试卷
- 《危险化学品企业安全生产标准化规范》专业深度解读与应用培训指导材料之6:5管理要求-5.6 设备完整性(雷泽佳编制-2025A0)
- 市场调查与分析(完全)
- 临床专业考试试题及答案
- 裸眼3D研究报告裸眼3D项目商业计划书(2025年)
- 芯片知识课件下载
- 计算机组成原理练习题(含参考答案)
- (四调)武汉市2025届高中毕业生四月调研考试 生物试卷(含答案)
- 2024年青海省中考生物地理合卷试题(含答案解析)
- 组织环境因素及相关方需求和期望识别表
- 最新企业资产管理系统(EAM)简介
- ISO9001质量管理体系运行情况总结
评论
0/150
提交评论