• 针对应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行可信平台的模型体系结构

    To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.

    youdao

  • 运行检查文件完整性非常关键的;因此建议使用可信执行

    Checking the integrity of the files at run time is very crucial; therefore, using the Trusted Execution is recommended.

    youdao

  • 完成任务之后运行以下命令启用可信执行

    Once this is done, run the following command to turn on the Trusted Execution.

    youdao

  • 可信执行至关重要功能之一运行检查可信文件完整性

    One of the crucial features of the trusted Execution is to check the integrity of the trusted files at run time.

    youdao

  • 我们站点上,在运行cfengine之前我们使用一个中央可信位置来执行 rsync /etc/cfengine。

    At our site, we rsync /etc/cfengine with a central trusted location before running cfengine.

    youdao

  • 可信执行支持每当执行任何命令时候执行运行完整性检查TCB主要执行定期系统完整性检查

    Trusted Execution supports the run-time integrity check whenever any command is executed, whereas the TCB mostly does the periodic checking of system integrity.

    youdao

  • 代理作为可信应用程序运行WebSphereMQAPI调用高效地处理。

    When the broker runs as a trusted application, WebSphere MQ API calls are processed more efficiently.

    youdao

  • W3Evalapplet无法可信的 HP-41更易正如名称暗示一个只能运行Web表达式求值程序。

    The W3Eval applet can't make your trusty HP-41 easier to use -- as its name implies, it's an expression evaluator that runs only on the Web.

    youdao

  • 因为研究入组人数较少,研究设计运行,所以大多数类研究数据不太可信

    Many of these studies were discredited because they involved small numbers of people, were poorly designed, and poorly run.

    youdao

  • 如果运行公司名声这个标志成为一个可信符号欣然接受

    If the person running the business has a positive reputation, the logo will be a mark of credibility and be readily accepted.

    youdao

  • 主机以外网络(内部网外部网)认为是不的,因此可以针对该主机运行具体应用和对外提供的服务设定针对性很强的安全策略

    Outside the host network (Intranet or extranet) are considered not to be trusted, so the application can run on the host and external services to set targeted strong security policy.

    youdao

  • 尽管多年来业界教育用户注意点击附件带来危害,但用户还是非常愿意运行主动发送机器的不可信赖的可执行文件。

    Despite years of education about the dangers of clicking on attachments, users have proven all too willing to run untrusted executables that arrive unsolicited on their machines.

    youdao

  • 谈论客户端到底发生了什么,我将会导论可信代码以及安全性以及运行在。

    After I talk about what happened to the rich client, I will discuss trusted code and security as well as deployment of code that runs on the.

    youdao

  • 远程认证技术提供了一种终端平台运行环境配置进行可信评估的手段。

    Remote attestation technology provides us a instrumentality to attest the running environment and the configuration of a remote platform.

    youdao

  • 提出基于可信理论运行风险评估算法,采用随机模糊变量期望值表示全系统运行风险指标。

    Based on the credibility theory, an algorithm for random fuzzy operational risk assessment is proposed, and power system operating risk is expressed by a random fuzzy expected value.

    youdao

  • 编程序具有运行快速判断准确逻辑清楚给出诊断同时给出可信优点。

    In the program there are some advantages, such as fast operation, high decision accuracy, clear logic, and can give a diagnosis with confidence.

    youdao

  • 建立仿真环境能够支持对整个施工过程不同层次的建模仿真运行可以比较真实的反映施工过程具有较高可信

    The simulation environment supports a various-hierarchy modeling and simulation of construction progress, and it has high credibility because it can reflect the real construction process.

    youdao

  • 如果确定可信则会运行脚本

    If the trust is verified, the script runs.

    youdao

  • 同时能够阻止病毒程序恶意代码程序运行这样可信计算平台解决加密系统及其运行环境的安全性问题

    In the same time, Trusted Computing platform can prevent the run of virus program and malicious code. This platform also solves the security problem of encrypt system and run environment.

    youdao

  • 编译可信对于整个计算机系统而言具有非常关键的意义如果编译器可信,则很难保证系统所运行软件可信性。

    Compiler's trust has great significance for the whole computer system. If the compiler is not trusted, the software's trust cannot be guaranteed at runtime.

    youdao

  • 如果选择选项,则客户计算机上安装运行应用程序时,该应用程序会请求“不完全可信权限

    If you select this option, the application requests Partial Trust permissions when it is installed or run on a client computer.

    youdao

  • 方法充分地利用现有得到电网运行数据,对重新进行整理,根据持续负荷曲线进行线损计算,得到更加精确可信结果

    It fully USES the available power network data and rearranges it. More accurate and convincing result can be obtained from the line loss computation based on durative load curve.

    youdao

  • 方法充分地利用现有得到电网运行数据,对重新进行整理,根据持续负荷曲线进行线损计算,得到更加精确可信结果

    It fully USES the available power network data and rearranges it. More accurate and convincing result can be obtained from the line loss computation based on durative load curve.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定