×

trusted computing base meaning in Chinese

可信计算基

Examples

  1. The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain
    授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
  2. Also part of the trusted computing base of the distributed system , and they flow together on the wire whenever a client is required to gain access to a particular object
    产生并颁发的,它也是分布式系统中可信计算基础的一部分)中,每当客户机被要求获得对某个特定对象的访问权限时,它们就会一起在线路上传输。
  3. The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security
    第一章对信息保障的历史进行回顾,介绍在信息保障的发展历程中有关信息安全的概念和方法,如:引用监视器( rm ) 、引用确认机制( rvn ) 、可信计算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。

Related Words

  1. trust possession
  2. irrevocable trust
  3. resulting trust
  4. trust port
  5. spraying trusts
  6. blind trust
  7. unit trust
  8. trust obligation
  9. trust bank
  10. executory trust
  11. trusted computer system
  12. trusted computing
  13. trusted connection
  14. trusted courtier
PC Version

Copyright © 2018 WordTech Co.