• The security model is the core content in the trusted information system and the key field of the trusted computing research.

    安全模型既是可信信息系统核心内容,也是可信计算研究重要领域

    youdao

  • In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.

    可信计算平台维护过程中,需要保证保护数据完整性安全性可用性。

    youdao

  • TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.

    基于TPM安全优盘系统使用可信计算平台模块TPM实现密钥存储管理解决密码技术中密钥管理的难题

    youdao

  • The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.

    授权数据那些属于系统可信计算基础服务器颁发的,因此管理域中可以认为是安全的。

    youdao

  • The successful application of "a trusted computing platform System" funded by 863 Projects indicates that future of the trusted computing platform will be promising.

    基于863项目可信计算系统平台安全芯片研制成功,展现了可信计算的良好应用前景

    youdao

  • The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.

    可信计算计算通信系统广泛使用基于硬件安全模块支持下的可信计算平台提高整体安全性

    youdao

  • Pushing the device emulation from the hypervisor to user space has some distinct advantages. The most important advantage relates to what's called the trusted computing base (TCB).

    设备模拟管理程序推向用户空间一些明显优势最大优势涉及所谓可信计算基础(trusted computing base, TCB)。

    youdao

  • Remote attestation which the users are used to identify themselves to connect remote communication is required in the trusted computing. As well as the users require to protect their privacy.

    同时,可信计算技术中,终端计算机通过用户身份认证来实现安全的远程访问,用户在实现远程认证的同时要求保护自己的隐私不被泄漏。

    youdao

  • To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.

    针对应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行的可信平台模型体系结构

    youdao

  • Trusted Computing Base (TCB) is the security feature available with IBM AIX versions later than version 4.1.

    可信计算基础Trusted Computing Base,TCB 4.1以后IBMAIX版本提供安全功能

    youdao

  • Identity management must evolve for the cloud to become a trusted computing platform.

    云端身份管理需要进化,才能够成为一个值得信赖计算平台。

    youdao

  • Trusted Computing Base is an install-time option only and to enable TCB on an existing AIX machine, you need to reinstall the entire AIX operating system.

    可信计算基础只是一个安装选项并且若要现有的AIX计算机上启用TCB需要重新安装整个AIX操作系统。

    youdao

  • Although Cisco is new to the space, it has a trusted name and brings a different, video-focused spin to tablet computing that could help break tablets into the mainstream.

    思科平板电脑市场是个新手,但其良好的信誉专注于视频的特色可能帮助平板电脑步入主流。

    youdao

  • Trusted computing fully absorbed this idea, and was applied to a computer in the world.

    可信计算充分吸收了这种理念将其运用计算机世界当中。

    youdao

  • To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.

    模型透明计算机系统基础,利用透明计算技术计算机内部安全问题进行控制。

    youdao

  • With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.

    随着信息技术飞速发展可信计算机安全方面优越性越来越受到国内外计算机领域工作者的重视。

    youdao

  • The paper analyses a kind of terminal architecture of trusted computing platform, and discusses it's possible application mode. It can reference terminal security.

    文章分析了可信计算平台终端安全体系讨论了可信计算平台可能应用模式终端的安全防护能够起到一定的指导意义。

    youdao

  • Trusted computing platform is a computer soft hardware entity to solve the hidden trouble of information security, which makes people pay more and more attention to it.

    可信计算平台作为解决信息安全隐患计算机软硬件实体引起人们越来越多的关注

    youdao

  • By using trusted computing theory, we build a credible hardware and operating system environment at payment terminal, and then we extends the credibility to the electronic payment system.

    本论文中,我们提出可信计算电子支付结合起来,实现安全电子支付终端方案

    youdao

  • This decline was met with arguments in favor of building security into the technical system, both at its core, in the network elements themselves, and at its periphery, through "trusted computing."

    这种下降伴随着这样种争论通过“可信度计算”技术系统建立安全机制,不只是在核心——网络元素中,而且周边设备中。

    youdao

  • The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.

    安全性分析证明协议可以可信计算环境保证密钥交换机密性可靠性,同时还可以保证主机完整性与主机匿名性

    youdao

  • This paper introduces the main idea and architecture of trusted computing, analyses its principles and technologies.

    介绍可信计算基本思想体系结构分析了可信计算原理技术

    youdao

  • Finally we note that trusted computing has been the subject of a considerable amount of criticism.

    最后我们主要可信计算处理器已经成为门广为批评话题

    youdao

  • Suggestions have been made that trusted computing is both a potential threat to user privacy and a threat to the ability of the owner of a PC to use it however he or she wishes.

    民众意见认为可信计算机处理器不但是个人用户潜在威胁还是所有个人电脑使用者期待怎么使用能力一种威胁。

    youdao

  • Therefore, people pay more attention to build a trusted computing system which can guarantee the security and integrality of their privacy information.

    如何保证企业用户信息机密性、完整性、真实性,提供一个信赖计算环境成为人们日益关注的焦点。

    youdao

  • According to the insufficiency of Internet of Things (IOT) on information transmission, a trusted anonymous information transmission protocol of IOT is proposed with trusted computing technology.

    针对传统物联网物品信息传输过程存在的不足提出可信匿名物联网信息传输协议

    youdao

  • In the same time, Trusted Computing platform can prevent the run of virus program and malicious code. This platform also solves the security problem of encrypt system and run environment.

    同时能够阻止病毒程序恶意代码程序运行这样可信计算平台解决加密系统及其运行环境的安全性问题

    youdao

  • This thesis also presents a method to extend the edge of the control area of the secure OS by adopting trusted computing techniques such as remote attestation and sealed storage.

    最后讨论安全操作系统边界扩展问题,利用可信计算,结合远程证明封装存储相关技术,扩展安全操作系统的控制范围

    youdao

  • The researches proposed by this thesis can not only support the secure OS research but also be used a reference of trusted computing-based work.

    本文研究成果不仅安全操作系统研究提供了支撑为基于可信计算安全技术的研究方向提供一定的借鉴

    youdao

  • The researches proposed by this thesis can not only support the secure OS research but also be used a reference of trusted computing-based work.

    本文研究成果不仅安全操作系统研究提供了支撑为基于可信计算安全技术的研究方向提供一定的借鉴

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定