ID | 原文 | 译文 |
4653 | 为解决大型系统中大量设备配置方式多样性导致人工安全设备配置复杂烦琐、容易出错、效率低下的问题,设计了一种基于动态模板的策略翻译及配置方法。 | To solve the problem of complex, cumbersome and error-prone configuration of security devices caused by theheterogeneous configuration modes in complex networks, a dynamic template-based scheme for translating and confi-guring policy was proposed. |
4654 | 通过构建基于编码的策略翻译模板,利用编码简单、通用、易计算的特点,指导归一化策略向设备个性化配置命令行转换,同时通过关键词对比法,保证策略配置的准确性。 | In detail, considering the code's features, the code-based template for translating policieswas constructed to configure the command line conversion, and the keyword comparison method was used to ensure theaccuracy of policy configuration. |
4655 | 实验分析结果证明,所提策略翻译及配置方法具有强扩展性和高准确度。 | Experiments show that the scalability and the accuracy of the proposed scheme. |
4656 | 为解决传统密钥交换协议无法进行三方密钥协商,不够灵活且安全性存在缺陷的问题,借助于秘密矩阵特征值, | In order to solve the problem that the traditional key exchange protocol, which was not flexible enough andflawed in security, cannot provide the function of three-party key negotiation, |
4657 | 首先提出了一种可以抵御中间人攻击且简单灵活的三方密钥交换方案,但该方案无法对密钥交换的有效性进行验证,即无法防止不被中间人伪造。 | firstly, a simple and flexible three-party keyexchange scheme that can resist man-in-the-middle attacks was proposed with the help of secret matrix eigenvalues.However, the validity of key exchange cannot be verified by the scheme, and counterfeiting by middlemen can't be pre-vented. |
4658 | 在此基础上,对秘密矩阵进行重新构建,其中矩阵阶数为大偶数,所有的特征值成对出现,相似于对角阵。 | Then based on it, the secret matrix was reconstructed, where the matrix order was a large even number, and all theeigenvalues appeared in pairs, similar to the diagonal matrix. |
4659 | 基于所提的特殊秘密矩阵,引入验证环节对通信方的合法性进行验证,给出了基于特征值的可验证三方密钥交换协议。 | Based on the special secret matrix, the verification partwhich can be used to verify the legitimacy of the communication party was introduced to the scheme, and the verifiablethree-party key exchange protocol based on the eigenvalue was given. |
4660 | 该协议既解决了三方密钥交换的问题,又可对身份合法性进行验证,证明基于特征值进行三方密钥交换协议设计是可行的,最终设计的协议兼具安全性和高效性。 | The protocol not only solved the problem ofthree-party key exchange, but also verified identity legitimacy. It is proved that it's feasible to design a three-party keyexchange protocol by the eigenvalue. The final protocol is both secure and efficient. |
4661 | 针对现有推荐算法缺乏对用户偏好的考虑,推荐效果不理想的问题,提出了一种联合张量填补和用户偏好的推荐算法。 | Aiming at the problem that existing recommendation algorithms have little regard for user preference, and therecommendation result is not satisfactory, a joint recommendation algorithm based on tensor completion and user prefe-rence was proposed. |
4662 | 首先,基于评分矩阵和项目所属类别矩阵构建用户–项目–类别的三维张量; | First, a user-item-category 3-dimensional tensor was built based on user-item scoring matrix anditem-category matrix. |