structured protection meaning in English
级别称为结构化的保护
结构化保护
Examples
- Daacm is conformant to the requirements of the secure operating system design of structured protection level , and will be used to the practical system design
Daacm符合论文中给出的《结构化保护级》安全操作系统设计的需要,并将实际应用于该系统的设计之中。 - Second , corresponding to splpp and according to the requirements of gb / t18336 , a security target ( st ) design of a secure operating system which is conformant to the security function of the structured protection level of gb 17859 is constructed and presented in detail
第二,对应于安全保护框架splpp ,首次按照gb t18336要求,对一个安全功能符合gb17859 《结构化保护级》相应要求的安全操作系统进行了详细的安全目标( st )设计。 - With the practical development of a secure operating system in accordance with the requirements of the fourth level , i . e . structured protection level , of gb 17859 , some key technologies of high level secure operating system are conducted both theoretically and practically in this thesis
本文围绕着一个符合gb17859第四级《结构化保护级》安全操作系统的设计开发,从理论和实践两个方面研究了高安全等级操作系统研制所涉及的一些关键技术问题。 - To sum up , this thesis discusses many helpful technologies , and achieves some experiences for the implementation of structured protection level secure operating system and the principal achievements of this thesis establish a firm foundation for the research and design of the high level secure operating system
总之,本文探讨和积累了许多《结构化保护级》安全操作系统设计的技术和经验,其研究成果为我国更高安全等级操作系统的设计和开发奠定了基础。 - Linux has been more and more widely used today , but the secure degree of linux is low , so in this paper , we produce a linux - compatible secure operating system , named slinux . its design object is in accordance with the requirements of the fourth level , i . e . structured protection level , of gb17859 . for this purpose , we introduce such mechanism , as identification & authentication , mac , least privilege manage , trusted path , password management . object reuse , covert and channel analysis . furthermore , we have some innovation , introduce the mechanism of network security and audit
本论文的研究目的是对linux进行安全增强,设计一个新的安全操作系统,即slinux安全操作系统,其设计目标是满足gb17859第四级《结构化保护级》的需求,为此我们在原有linux操作系统的基础上引入了标识与鉴别机制, mac机制,最小特权管理机制,可信通路机制,密码处理机制,客体重用机制以及隐通道分析机制,同时还进行了创新,引入了网络安全保护机制和审计机制。