trusted computing base 中文意思是什麼
trusted computing base
解釋
可信計算基-
The conc9pts and approaches relating to information security among the course of development of the ia are introduced. for example, reference monitor ( are ), reference validation mechanism ( rvm ), trusted computing base ( tcb ), security model, tcsec, cc, iatf fritsa, etc. chapter 2 analyzes the time and space property " of information security
第一章對信息保障的歷史進行回顧,介紹在信息保障的發展歷程中有關信息安全的概念和方法,如:引用監視器( rm ) 、引用確認機制( rvn ) 、可信計算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。 -
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain
授權數據是由那些屬于系統中可信計算基礎的服務器頒發的,因此在它所管理的域中可以認為是安全的。 -
Also part of the trusted computing base of the distributed system, and they flow together on the wire whenever a client is required to gain access to a particular object
產生並頒發的,它也是分散式系統中可信計算基礎的一部分)中,每當客戶機被要求獲得對某個特定對象的訪問權限時,它們就會一起在線路上傳輸。
分享友人