可信计算 meaning in English
dependable computing
trusted computing
Examples
- The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。 - In the end of the lecture , mr . zhang also introduced to us the four research points this year : operating system , game figures , embedded system and authentic calculation
讲座最后,张老师还为我们介绍了微软今年的四大研究重点:操作系统,游戏图形,嵌入式系统,可信计算。 - The extended trusted computing and forensic services are used in collecting and analysis activity , including forensic sealing , forensic authentication , key recovery and distributed forensic services
利用可信计算取证服务和改进的分析流程能够有效解决可信计算环境中的数字取证调查问题。 - In the same time , trusted computing platform can prevent the run of virus program and malicious code . this platform also solves the security problem of encrypt system and run environment
同时,能够阻止病毒程序、恶意代码程序的运行,这样可信计算平台解决了加密系统及其运行环境的安全性问题。 - Also part of the trusted computing base of the distributed system , and they flow together on the wire whenever a client is required to gain access to a particular object
产生并颁发的,它也是分布式系统中可信计算基础的一部分)中,每当客户机被要求获得对某个特定对象的访问权限时,它们就会一起在线路上传输。