iatf meaning in Chinese
国际汽车产业工作小组
信息安全保障技术框架
信息保障技术框架
Examples
- Only iatf registrars are authorized to conduct the surveillance audit
仅仅iatf登记官被授权进行监视审计。 - 32 registrars are sought out in the current pilot program with iatf
32个登记官外面与iatf在当前的飞行员节目被寻求。 - 10 permit aqa to provide copies of the final assessment report to anab , iatf , aaqg , or faa , as appropriate
在适当的情况下,允许aqa将最终的审核报告复印件提交给anab , iatf , aaqg或者faa 。 - The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security
第一章对信息保障的历史进行回顾,介绍在信息保障的发展历程中有关信息安全的概念和方法,如:引用监视器( rm ) 、引用确认机制( rvn ) 、可信计算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。