trusted computing 中文意思是什麼
-
Implementation of trusted computing in commercial cryptogram based on hardware
基於硬體系統的商用密碼可信計算實現方法 -
Lev has also worked in the areas of application security and trusted computing
Lev也從事于應用程序安全和可信的計算方面的研究。 -
6 vaughan - nichols s j. how trustworthy is trusted computing. ieee computer, 2003, 36 : 18 - 20
例如使用群體不再是彼此信任的研究者,業務也不再是簡單的數據傳送。 -
So the trusted computing environment can be investigated by extend forensic services and improved workflow
從可信計算和數字取證技術角度,分析了該模型的取證能力指標。 -
The research on constructing a network based on trusted computing
構建可信計算網路的研究 -
Trusted computing research on computer security problems
針對安全問題的可信計算研究 -
Digital forensics of trusted computing environment
可信計算環境中的數字取證 -
The conc9pts and approaches relating to information security among the course of development of the ia are introduced. for example, reference monitor ( are ), reference validation mechanism ( rvm ), trusted computing base ( tcb ), security model, tcsec, cc, iatf fritsa, etc. chapter 2 analyzes the time and space property " of information security
第一章對信息保障的歷史進行回顧,介紹在信息保障的發展歷程中有關信息安全的概念和方法,如:引用監視器( rm ) 、引用確認機制( rvn ) 、可信計算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。 -
Trusted computing platform only performs the program that is assured by trusted root, and ensures the running program is legal
可信計算平臺只執行被信任根源擔保的程序,並保證運行的程序都是合法的。 -
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain
授權數據是由那些屬于系統中可信計算基礎的服務器頒發的,因此在它所管理的域中可以認為是安全的。 -
Agents and peer - to - peer computing, melbourne, australia, 2004, lecture notes in computer science, 2872 : 23 - 34. 26 felten e w. understanding trusted computing : will its benefits outweigh its drawbacks ? ieee security privacy magazine, 2003, 1 : 60 - 62
網路的可信性要求保證網路和用戶的行為是可預期和可管理的,要求實現對網路行為動態過程的分析及閉環控制,保障系統的安全信任和自愈等問題。 -
Trusted platform module is the core of the trusted computing
在可信計算技術中,可信平臺模塊是可信計算技術的核心。 -
Key management in the platform of trusted computing
可信計算平臺中的密鑰管理 -
Study of trusted computing and its development
可信計算的研究及其發展 -
Realization of trusted computing platform
可信安全計算平臺的一種實現 -
Research and development of trusted computing
可信計算研究的初步探疑 -
Trusted computing and trustworthy networks
可信計算與可信網路 -
Development of trusted computing research
可信計算研究進展 -
Research and application of architecture based on trusted computing platform
基於可信計算平臺的體系結構研究與應用 -
Also part of the trusted computing base of the distributed system, and they flow together on the wire whenever a client is required to gain access to a particular object
產生並頒發的,它也是分散式系統中可信計算基礎的一部分)中,每當客戶機被要求獲得對某個特定對象的訪問權限時,它們就會一起在線路上傳輸。
分享友人