• However, as you will see in later parts of this series, cloud computing also raises questions of ownership, security, and cost.

    然而正如系列后面部分看到的,计算带来所有权安全成本方面的问题

    youdao

  • While the benefits of using computing in the clouds are well known, its adoption is hindered by security concerns.

    使用计算好处已经众所周知的,然而安全方面考虑采用障碍

    youdao

  • In general, the more you do online - social networking, cloud computing etc - the more your privacy and security are at risk.

    总的来说,网上操作——网络社交、信息处理——越多隐私安全风险则越大

    youdao

  • In part 3, the final part of this series, you will examine the issues of governance and security that come with cloud computing.

    第3部分,即系列最后一部分了解计算中的治理安全问题

    youdao

  • Finally, I'll look at what criteria you need to test how well SaaS is performing in cloud computing and some security issues with SaaS.

    最后介绍测试SaaS计算中的执行情况所需条件以及SaaS在安全性方面的问题。

    youdao

  • Degree required: Associate's or bachelor's degree in computing or certifications in information security.

    文凭要求计算机学士学位大专学位,或信息安全认证

    youdao

  • With the use of systems in the cloud, there is the ever present risk of data security, connectivity, and malicious actions interfering with the computing processes.

    如果使用中的系统数据安全性连接性方面风险恶意活动也可能会妨碍计算过程。

    youdao

  • The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.

    可信计算计算通信系统广泛使用基于硬件安全模块支持下的可信计算平台提高整体安全性

    youdao

  • Computing: Quantum cryptography is unbreakable in theory. But like any security system, in practice it is only as safe as its weakest link.

    计算量子密码理论上无法破解的。任何安全系统一样,实践中安全度取决于系统里最薄弱一环

    youdao

  • In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.

    可信计算平台维护过程中,需要保证保护数据完整性安全性可用性。

    youdao

  • This dissertation studies how to build trust model for grid computing in order to find out malicious users and improve security and reliability of system.

    本文研究如何网格计算建立信任模型排除内部恶意节点,提高系统安全可靠程度。

    youdao

  • Reviews the basic content of cloud computing and its security issues in details.

    并详细介绍当今计算基本内容以及其中的安全问题

    youdao

  • A remote password authentication scheme is given only applying some arithmetic operation and an one_way function in field GF (p), and analyses this schemes security and computing property.

    应用GF (P)上的代数运算单向函数,构造了一种不用通行字表的远程通行认证方案方案进行了安全性分析计算特性分析。

    youdao

  • The security model is the core content in the trusted information system and the key field of the trusted computing research.

    安全模型既是可信信息系统核心内容,也是可信计算研究重要领域

    youdao

  • In the same time, Trusted Computing platform can prevent the run of virus program and malicious code. This platform also solves the security problem of encrypt system and run environment.

    同时能够阻止病毒程序恶意代码程序运行这样可信计算平台解决加密系统及其运行环境的安全性问题

    youdao

  • There are two classes of security problems in distributed computing system, security of hosts and security of distributed applications.

    分布式计算系统安全问题分为大类:分布式计算安全和主机的安全。

    youdao

  • LI Dong, born in 1967, professor. His research interests include computer network security, parallel computing, computer architecture, and computer graphics.

    李东,男,1967年教授主要研究领域为网络信息安全技术并行计算计算机系统结构,计算机图形学等

    youdao

  • In the GT2, the earlier version of GT, it relies on grid security infrastructure (GSI) to guarantee the security of the grid computing circumstances.

    早期版本gt2,是通过网格安全基础设施(GSI)保障网格计算环境安全。

    youdao

  • Then common reconfigurable computing platforms are introduced and also the application models of reconfigurable computing in areas such as signal processing and network security.

    然后介绍了几种常见重构计算平台以及可重构计算信号处理网络安全领域应用模型

    youdao

  • The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.

    安全性分析证明协议可以可信计算环境保证密钥交换机密性可靠性,同时还可以保证主机完整性与主机匿名性

    youdao

  • The Grid MP platform is a comprehensive architecture that was built from the ground up to tackle the unique challenges of security, scalability, and manageability in distributed computing.

    网格MP平台一个综合性架构分布式计算建立基础应用直到解决特别安全、可测量性可管理性挑战上 的。

    youdao

  • With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.

    随着信息技术飞速发展可信计算机安全方面优越性越来越受到国内外计算机领域工作者的重视。

    youdao

  • Cloud computing is no different, even though the risks of not having a sound security strategy are much greater in cloud computing.

    计算一样,即使没有听到云计算方面安全策略冒险

    youdao

  • As a new computing paradigm, ubiquitous computing has generally come into our life. At the same time, security in ubiquitous computing is attracting more and more attention.

    作为一种新的计算模式普适计算在逐渐进入我们生活同时,普适计算下的安全引起了越来越多的关注。

    youdao

  • This book describes in detail with the crane hoisting the computing and security technologies.

    本书详尽介绍起重吊装有关的计算安全技术。

    youdao

  • The alliance, which plans to make its first big splash at the upcoming RSA Conference, was formed to promote security best practices in a cloud computing environment.

    联盟准备即将召开RSA数据安全展示会议上进行首次亮相。安全联盟成立的目的为了计算环境下提供最佳的安全方案。

    youdao

  • A security model of services computing is presented in this paper. Main idea and advantages of trust domain based security model are analyzed.

    本文给出了服务计算安全模型分析了这种应用逻辑与安全策略分离的基于信任的安全模型的主要思想优点

    youdao

  • A security model of services computing is presented in this paper. Main idea and advantages of trust domain based security model are analyzed.

    本文给出了服务计算安全模型分析了这种应用逻辑与安全策略分离的基于信任的安全模型的主要思想优点

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定