繁體版 English 日本語FrancaisРусский
登录 注册

trusted computing

"trusted computing"的翻译和解释

例句与用法

  • A form of “ trusted computing , ” the idea drew several objections ? chief among them , it would enable remote organizations to track what users do with their machines
    这是一种信赖运算形式的概念,具有几项目标,其中最主要的,就是让远端机构,能够追踪使用者对机器的使用行为。
  • The extended trusted computing and forensic services are used in collecting and analysis activity , including forensic sealing , forensic authentication , key recovery and distributed forensic services
    利用可信计算取证服务和改进的分析流程能够有效解决可信计算环境中的数字取证调查问题。
  • In the same time , trusted computing platform can prevent the run of virus program and malicious code . this platform also solves the security problem of encrypt system and run environment
    同时,能够阻止病毒程序、恶意代码程序的运行,这样可信计算平台解决了加密系统及其运行环境的安全性问题。
  • Also part of the trusted computing base of the distributed system , and they flow together on the wire whenever a client is required to gain access to a particular object
    产生并颁发的,它也是分布式系统中可信计算基础的一部分)中,每当客户机被要求获得对某个特定对象的访问权限时,它们就会一起在线路上传输。
  • Performed on trusted computing platform , the protocol designed in this paper compares with the traditional security protocols , the computing speed is faster , the perform efficiency is higher , the information transfer is more safe
    本文设计实现的协议应用在可信计算平台上与传统的安全协议相比数据计算速度更快、协议执行效率更高、信息传输更安全。
  • Agents and peer - to - peer computing , melbourne , australia , 2004 , lecture notes in computer science , 2872 : 23 - 34 . 26 felten e w . understanding trusted computing : will its benefits outweigh its drawbacks ? ieee security privacy magazine , 2003 , 1 : 60 - 62
    网络的可信性要求保证网络和用户的行为是可预期和可管理的,要求实现对网络行为动态过程的分析及闭环控制,保障系统的安全信任和自愈等问题。
  • Otherwise , bnuisms introduced the concept of orient terminal trusted computing which is the trend of development of information security technologies . by strengthening the defence ability of terminal , bnuisms enhanced the whole system ’ s security defence level
    此外,系统还全面采用面向终端的“可信计算”的概念,通过端系统软件加强了端系统的防护能力,并全面提高了系统的安全防护水平。
  • We construct the model of security protocol based the trusted computing platform . 2 . in the analysis of this new protocol , we take the network attack for validate , and also use the formalized method to prove protocol security theoretically
    在本文的研究过程中,主要取得了以下一些研究成果: 1 .建立了基于可信计算平台的安全协议模型; 2 .在对协议进行分析的过程中,除了使用攻击验证外,还使用了形式化分析的方法,在理论上证明了协议的安全性。
  • Taking the current security protocol to use in trusted computing platform directly without modify , this process can ensure the communications security but do not take the advantage of trusted computing platform . the perform efficiency is low , and this can ’ t complete authentication of platform
    如果把目前的安全协议不加以修改就直接用在可信计算平台上,虽然可以保证通信安全但是没有发挥出可信计算平台的优势,协议的执行效率不高,而且也无法完成对平台的认证。
  • Some simulation experiments are carried out to verify our conclusions . in order to introduce ibbk model into pki system to resolve inflexibility of trust control and much risk of trust , integrity , authentication , no - repudiation guarantee and time stamp services should be satisfied . this paper designs ibbk trust computation engine of pki combining ibbk trust computing model and trust management model
    为了解决pki工程中层次式强制信任模型在信任控制上不灵活、信任风险过大等问题,本文将ibbk信任计算模型应用到pki中,并在完整性保护、身份认证、不可否认性和时间戳服务上进行了安全适应性补充,同时结合信任管理思想详细设计了pki中的ibbk信任计算引擎。
  • 更多例句:  1  2  3  4
用"trusted computing"造句  
英语→汉语 汉语→英语