Separate secure domain is the basic requirement for secure OS.
安全操作系统的基本要求。
It is definitely the most stable, most secure OS that Microsoft has ever released.
这绝对是最稳定、最安全的操作系统,微软曾释放了。
The researches proposed by this thesis can not only support the secure OS research but also be used a reference of trusted computing-based work.
本文的研究成果不仅为安全操作系统的研究提供了支撑,还为基于可信计算的安全技术的研究方向提供了一定的借鉴。
Resolution of integration of multi security policies is the base problem in secure OS which supports multi security policies and dynamic policies.
解决多安全策略的集成性问题是安全操作系统支持多策略和动态策略的基础。
As a member of the nt line, Windows 2000 added Windows 98's Web integration to a stable, relatively secure OS designed for workstation and server environments.
作为NT产品线的一员,Windows 2000把Windows 98的Web集成界面添加到专为工作站和服务器环境而设计的、稳定的、相对安全的操作系统中。
Many insecure services have been ripped away, and the kernel has been customized. The minimum function has been provided, and the system runs on the secure OS.
该系统定制内核,做到功能最小化,去除了众多不安全的服务,使安全防护体系建立在一个安全的操作系统上。
Accordingly, typical FMPs of each class are analyzed and compared, and a research direction is pointed out. A practical case of enforcing FMP in secure OS is described.
对典型例子进行了分析和比较,结合真实安全环境的特征提出了今后的研究方向,列举了一种FMP在安全操作系统中实施的实例。
This thesis also presents a method to extend the edge of the control area of the secure OS by adopting trusted computing techniques such as remote attestation and sealed storage.
最后讨论了安全操作系统的边界扩展问题,利用可信计算,结合远程证明,封装存储等相关技术,扩展了安全操作系统的控制范围。
Client Managed Server - only initial OS installation provided, from that point forward the customer maintains and secure the OS including licensing of the OS.
客户自管理的服务器——只提供安装了操作系统的初级服务器,客户需要从此开始自行维护操作系统(包括操作系统许可证)并保障其安全性。
I have provided a supporting library for making use of the OS-specific secure socket calls for Win32 systems.
我已经为Win32系统提供了一个特定于OS的securesocket调用的支持库。
Prior to 1999, his career was focused on software and product development ranging from Expert Systems, OS/2, and Secure Internet Payment Systems.
年以前,他致力于从专家系统、OS/2 到网络安全付费系统的软件和产品开发。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
In a secure ecosystem, all software components in the OS or any application would not only be signed and authenticated, but would seek approval before executing or being loaded into memory.
在安全可靠的生态系统下,操作系统中的所有软件组件或者任何应用程序不但需要签名和验证,还要在得到许可之后才可以执行或者调入内存。
In a secure ecosystem, all software components in the OS or any application would not only be signed and authenticated, but would seek approval before executing or being loaded into memory.
在安全可靠的生态系统下,操作系统中的所有软件组件或者任何应用程序不但需要签名和验证,还要在得到许可之后才可以执行或者调入内存。
应用推荐