We explore the WebSphere II process model and describe the difference between trusted and fenced wrappers; the latter being a prerequisite for exploitation of partitioned database resources.
我们将研究 WebSphere II 过程模型,并描述受信任的包装器与设防包装器之间的不同;后者是研究分区数据库资源的先决条件。
The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.
比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。
应用推荐