tcsec meaning in Chinese
可信计算机系统安全评估准则
可信计算机系统评估准则
可信计算机系统评价标准
可信计算机系统评价准则
Examples
- According to trusted compeer seeffiity evaluation standard ( tgskt ) , tfae security level of ^ armostall dbms is c2 , and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource
按照可信计算机评估标准tcsec看,当前多数dbms系统只具备c2级安全性,这种安全性对数据的保护是不够的。提供一个可靠的mlsdbms系统来保护系统信息资源是必要的,迫切的。 - This thesis researchs the correlative security evaluation criteria and analyses in detail linux kernel at first . linux kernel is improved at four aspects : access control list , capability , system audit , mandatory access control , based on linux kernel 2 . 4 . 4 on tcsec and the security level of linux is enhanced from cl to bl
本论文首先研究了相关的安全评估标准,并对linux内核进行了详细地分析,然后以tcsec为标准,基于linux内核2 . 4 . 4 ,分别从访问控制表、权能、系统审计以及强制访问控制四个方面时linux内核进行了改进,使linux的安个级别从c1级提高到了b1级。 - So the evaluation and certification on information security is a fundmental research area . since us dod developed tcsec in 1985 , the security community in the world has made great progress and at last developed cc ( common criteria ) which latter was publicized as international standard
国际社会中,自从1985年美国国防部发布了tcsec (可信计算机系统评估准则)以来,历经十余年的发展,已经制定了得到广泛认可的cc ( it安全通用评估准则) ,并将其作为国际标准发布。 - The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security
第一章对信息保障的历史进行回顾,介绍在信息保障的发展历程中有关信息安全的概念和方法,如:引用监视器( rm ) 、引用确认机制( rvn ) 、可信计算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。 - After intruducing the security demand from the computer area , this paper present the designing aim of the real time audit analysis system ( raas ) , considering the trusted computer system evaluation criteria ( tcsec ) of us dod and common criteria for it security evaluation ( cc )
本文首先介绍了计算机领域的安全需求,根据美国国防部的可信计算机评测标准( tcsec )和计算机信息系统的通用安全评价准则( commoncriteriaforitsecurityevaluation , cc )中提出的安全操作系统的审计标准,提出本系统的设计目的。