trusted computing base meaning in Chinese
可信计算基
Examples
- The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。 - Also part of the trusted computing base of the distributed system , and they flow together on the wire whenever a client is required to gain access to a particular object
产生并颁发的,它也是分布式系统中可信计算基础的一部分)中,每当客户机被要求获得对某个特定对象的访问权限时,它们就会一起在线路上传输。 - The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security
第一章对信息保障的历史进行回顾,介绍在信息保障的发展历程中有关信息安全的概念和方法,如:引用监视器( rm ) 、引用确认机制( rvn ) 、可信计算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。