• Trusted Execution environment over Trusted Computing base.

    可信执行环境与可信计算基础之比较

    youdao

  • Finally, we suggest a roadmap of trusted computing standard specifications.

    最后提出我国可信计算标准路线图制定的建议。

    youdao

  • Identity management must evolve for the cloud to become a trusted computing platform.

    云端身份管理需要进化,才能够成为一个值得信赖计算平台。

    youdao

  • Trusted computing fully absorbed this idea, and was applied to a computer in the world.

    可信计算充分吸收了这种理念将其运用计算机世界当中。

    youdao

  • Trustworthiness attestation of computing platform is a focus research work in Trusted computing.

    计算平台状态可信证明可信计算研究热点问题

    youdao

  • Finally we note that trusted computing has been the subject of a considerable amount of criticism.

    最后我们主要可信计算处理器已经成为门广为批评话题

    youdao

  • First, the paper studies the key management mechanisms of the existing Trusted Computing Platform;

    本文首先研究现有可信计算平台的密钥管理机制

    youdao

  • Trusted Computing Base (TCB) is the security feature available with IBM AIX versions later than version 4.1.

    可信计算基础Trusted Computing Base,TCB 4.1以后IBMAIX版本提供安全功能

    youdao

  • Trusted computing enhances computer systems'security by adding some module on both software and hardware.

    可信计算通过软件硬件增加一些组件增加计算机系统的可信赖性。

    youdao

  • The paper analyzes security of UCON model and puts forward the TUCON model based on Trusted Computing Module(TPM).

    主要对UCON模型安全性进行了分析可信计算模块TPM引入UCON模型,构建了基于TPM的使用控制模型——TUCON模型。

    youdao

  • This paper introduces the main idea and architecture of trusted computing, analyses its principles and technologies.

    介绍可信计算基本思想体系结构分析了可信计算原理技术

    youdao

  • The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.

    比较MTMTPM安全模型区别给出了实现可信机制过程

    youdao

  • The security model is the core content in the trusted information system and the key field of the trusted computing research.

    安全模型既是可信信息系统核心内容,也是可信计算研究重要领域

    youdao

  • This paper discusses key security technologies for a smart grid system, including public key infrastructures and trusted computing.

    本文讨论一个智能电网系统关键安全技术问题,包括公钥基础设施可信计算

    youdao

  • In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.

    可信计算平台维护过程中,需要保证保护数据完整性安全性可用性。

    youdao

  • Anonymity authentication is an important function of trusted computing platform, and it is used to deal with an issue of personal privacy.

    匿名认证可信计算平台重要功能旨在解决个人隐私的保密问题

    youdao

  • The researches proposed by this thesis can not only support the secure OS research but also be used a reference of trusted computing-based work.

    本文研究成果不仅安全操作系统研究提供了支撑为基于可信计算安全技术的研究方向提供一定的借鉴

    youdao

  • Trusted Computing Base is an install-time option only and to enable TCB on an existing AIX machine, you need to reinstall the entire AIX operating system.

    可信计算基础只是一个安装选项并且若要现有的AIX计算机上启用TCB需要重新安装整个AIX操作系统。

    youdao

  • TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.

    基于TPM安全优盘系统使用可信计算平台模块TPM实现密钥存储管理解决密码技术中密钥管理的难题

    youdao

  • The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.

    授权数据那些属于系统可信计算基础服务器颁发的,因此管理域中可以认为是安全的。

    youdao

  • Therefore, people pay more attention to build a trusted computing system which can guarantee the security and integrality of their privacy information.

    如何保证企业用户信息机密性、完整性、真实性,提供一个信赖计算环境成为人们日益关注的焦点。

    youdao

  • The paper analyses a kind of terminal architecture of trusted computing platform, and discusses it's possible application mode. It can reference terminal security.

    文章分析了可信计算平台终端安全体系讨论了可信计算平台可能应用模式终端的安全防护能够起到一定的指导意义。

    youdao

  • A user could access to trusted services in trusted computing platform only if he was authorized. So authorization is a key process to achieve trusted for platform.

    用户获取可信功能必须通过平台授权认证,因此授权认证实现平台可信一个关键环节

    youdao

  • The successful application of "a trusted computing platform System" funded by 863 Projects indicates that future of the trusted computing platform will be promising.

    基于863项目可信计算系统平台安全芯片研制成功,展现了可信计算的良好应用前景

    youdao

  • Trusted computing platform is a computer soft hardware entity to solve the hidden trouble of information security, which makes people pay more and more attention to it.

    可信计算平台作为解决信息安全隐患计算机软硬件实体引起人们越来越多的关注

    youdao

  • Pushing the device emulation from the hypervisor to user space has some distinct advantages. The most important advantage relates to what's called the trusted computing base (TCB).

    设备模拟管理程序推向用户空间一些明显优势最大优势涉及所谓可信计算基础(trusted computing base, TCB)。

    youdao

  • Suggestions have been made that trusted computing is both a potential threat to user privacy and a threat to the ability of the owner of a PC to use it however he or she wishes.

    民众意见认为可信计算机处理器不但是个人用户潜在威胁还是所有个人电脑使用者期待怎么使用能力一种威胁。

    youdao

  • The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.

    可信计算计算通信系统广泛使用基于硬件安全模块支持下的可信计算平台提高整体安全性

    youdao

  • This thesis also presents a method to extend the edge of the control area of the secure OS by adopting trusted computing techniques such as remote attestation and sealed storage.

    最后讨论安全操作系统边界扩展问题,利用可信计算,结合远程证明封装存储相关技术,扩展安全操作系统的控制范围

    youdao

  • This thesis also presents a method to extend the edge of the control area of the secure OS by adopting trusted computing techniques such as remote attestation and sealed storage.

    最后讨论安全操作系统边界扩展问题,利用可信计算,结合远程证明封装存储相关技术,扩展安全操作系统的控制范围

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定