trusted computing 中文意思是什麼

trusted computing 解釋
可信計算
  1. Implementation of trusted computing in commercial cryptogram based on hardware

    基於硬體系統的商用密碼可信計算實現方法
  2. Lev has also worked in the areas of application security and trusted computing

    Lev也從事于應用程序安全和可信的計算方面的研究。
  3. 6 vaughan - nichols s j. how trustworthy is trusted computing. ieee computer, 2003, 36 : 18 - 20

    例如使用群體不再是彼此信任的研究者,業務也不再是簡單的數據傳送。
  4. So the trusted computing environment can be investigated by extend forensic services and improved workflow

    從可信計算和數字取證技術角度,分析了該模型的取證能力指標。
  5. The research on constructing a network based on trusted computing

    構建可信計算網路的研究
  6. Trusted computing research on computer security problems

    針對安全問題的可信計算研究
  7. Digital forensics of trusted computing environment

    可信計算環境中的數字取證
  8. The conc9pts and approaches relating to information security among the course of development of the ia are introduced. for example, reference monitor ( are ), reference validation mechanism ( rvm ), trusted computing base ( tcb ), security model, tcsec, cc, iatf fritsa, etc. chapter 2 analyzes the time and space property " of information security

    第一章對信息保障的歷史進行回顧,介紹在信息保障的發展歷程中有關信息安全的概念和方法,如:引用監視器( rm ) 、引用確認機制( rvn ) 、可信計算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。
  9. Trusted computing platform only performs the program that is assured by trusted root, and ensures the running program is legal

    可信計算平臺只執行被信任根源擔保的程序,並保證運行的程序都是合法的。
  10. The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain

    授權數據是由那些屬于系統中可信計算基礎的服務器頒發的,因此在它所管理的域中可以認為是安全的。
  11. Agents and peer - to - peer computing, melbourne, australia, 2004, lecture notes in computer science, 2872 : 23 - 34. 26 felten e w. understanding trusted computing : will its benefits outweigh its drawbacks ? ieee security privacy magazine, 2003, 1 : 60 - 62

    網路的可信性要求保證網路和用戶的行為是可預期和可管理的,要求實現對網路行為動態過程的分析及閉環控制,保障系統的安全信任和自愈等問題。
  12. Trusted platform module is the core of the trusted computing

    在可信計算技術中,可信平臺模塊是可信計算技術的核心。
  13. Key management in the platform of trusted computing

    可信計算平臺中的密鑰管理
  14. Study of trusted computing and its development

    可信計算的研究及其發展
  15. Realization of trusted computing platform

    可信安全計算平臺的一種實現
  16. Research and development of trusted computing

    可信計算研究的初步探疑
  17. Trusted computing and trustworthy networks

    可信計算與可信網路
  18. Development of trusted computing research

    可信計算研究進展
  19. Research and application of architecture based on trusted computing platform

    基於可信計算平臺的體系結構研究與應用
  20. Also part of the trusted computing base of the distributed system, and they flow together on the wire whenever a client is required to gain access to a particular object

    產生並頒發的,它也是分散式系統中可信計算基礎的一部分)中,每當客戶機被要求獲得對某個特定對象的訪問權限時,它們就會一起在線路上傳輸。
分享友人