The security model is the core content in the trusted information system and the key field of the trusted computing research.
安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
The successful application of "a trusted computing platform System" funded by 863 Projects indicates that future of the trusted computing platform will be promising.
基于863项目“可信计算系统平台”的安全芯片研制成功,展现了可信计算的良好应用前景。
The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.
可信计算是在计算和通信系统中广泛使用基于硬件安全模块支持下的可信计算平台,以提高整体的安全性。
Pushing the device emulation from the hypervisor to user space has some distinct advantages. The most important advantage relates to what's called the trusted computing base (TCB).
将设备模拟从管理程序推向用户空间有一些明显的优势,最大的优势涉及所谓的可信计算基础(trusted computing base, TCB)。
Remote attestation which the users are used to identify themselves to connect remote communication is required in the trusted computing. As well as the users require to protect their privacy.
同时,在可信计算技术中,终端计算机是通过用户身份认证来实现安全的远程访问,用户在实现远程认证的同时也要求保护自己的隐私不被泄漏。
To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.
针对这一应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行的可信平台的模型和体系结构。
Trusted Computing Base (TCB) is the security feature available with IBM AIX versions later than version 4.1.
可信计算基础(Trusted Computing Base,TCB)是 4.1版以后的IBMAIX版本提供的安全功能。
Identity management must evolve for the cloud to become a trusted computing platform.
云端的身份管理还需要进化,才能够成为一个值得信赖的计算平台。
Trusted Computing Base is an install-time option only and to enable TCB on an existing AIX machine, you need to reinstall the entire AIX operating system.
可信计算基础只是一个安装时选项,并且若要在现有的AIX计算机上启用TCB,您需要重新安装整个AIX操作系统。
Although Cisco is new to the space, it has a trusted name and brings a different, video-focused spin to tablet computing that could help break tablets into the mainstream.
思科在平板电脑市场是个新手,但其良好的信誉和专注于视频的特色有可能帮助平板电脑步入主流。
Trusted computing fully absorbed this idea, and was applied to a computer in the world.
可信计算充分吸收了这种理念,并将其运用到计算机世界当中。
To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.
该模型以透明计算机系统为基础,利用透明计算技术对计算机内部的安全问题进行控制。
With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.
随着信息技术的飞速发展,可信计算机在安全方面的优越性越来越受到国内外计算机领域工作者的重视。
The paper analyses a kind of terminal architecture of trusted computing platform, and discusses it's possible application mode. It can reference terminal security.
文章分析了一种可信计算平台的终端安全体系,并讨论了可信计算平台的可能应用模式,对终端的安全防护能够起到一定的指导意义。
Trusted computing platform is a computer soft hardware entity to solve the hidden trouble of information security, which makes people pay more and more attention to it.
可信计算平台作为解决信息安全隐患的计算机软硬件实体,引起了人们越来越多的关注。
By using trusted computing theory, we build a credible hardware and operating system environment at payment terminal, and then we extends the credibility to the electronic payment system.
在本论文中,我们提出了将可信计算与电子支付结合起来,实现安全电子支付终端的方案。
This decline was met with arguments in favor of building security into the technical system, both at its core, in the network elements themselves, and at its periphery, through "trusted computing."
这种下降伴随着这样一种争论:通过“可信度计算”在技术系统中建立安全机制,不只是在它的核心——网络元素中,而且在它的周边设备中。
The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.
经安全性分析证明,该协议可以在可信计算环境下保证密钥交换的机密性与可靠性,同时还可以保证主机完整性与主机匿名性。
This paper introduces the main idea and architecture of trusted computing, analyses its principles and technologies.
介绍了可信计算的基本思想和体系结构,分析了可信计算原理和技术。
Finally we note that trusted computing has been the subject of a considerable amount of criticism.
最后,我们主要到可信计算处理器已经成为一门广为批评的话题。
Suggestions have been made that trusted computing is both a potential threat to user privacy and a threat to the ability of the owner of a PC to use it however he or she wishes.
民众意见都认为,可信计算机处理器不但是个人用户的潜在威胁,还是对所有个人电脑使用者期待怎么使用它的能力的一种威胁。
Therefore, people pay more attention to build a trusted computing system which can guarantee the security and integrality of their privacy information.
如何保证企业和用户信息的机密性、完整性、真实性,提供一个可信赖的计算环境成为人们日益关注的焦点。
According to the insufficiency of Internet of Things (IOT) on information transmission, a trusted anonymous information transmission protocol of IOT is proposed with trusted computing technology.
针对传统物联网物品信息传输过程中存在的不足,提出可信匿名的物联网信息传输协议。
In the same time, Trusted Computing platform can prevent the run of virus program and malicious code. This platform also solves the security problem of encrypt system and run environment.
同时,能够阻止病毒程序、恶意代码程序的运行,这样可信计算平台解决了加密系统及其运行环境的安全性问题。
This thesis also presents a method to extend the edge of the control area of the secure OS by adopting trusted computing techniques such as remote attestation and sealed storage.
最后讨论了安全操作系统的边界扩展问题,利用可信计算,结合远程证明,封装存储等相关技术,扩展了安全操作系统的控制范围。
The researches proposed by this thesis can not only support the secure OS research but also be used a reference of trusted computing-based work.
本文的研究成果不仅为安全操作系统的研究提供了支撑,还为基于可信计算的安全技术的研究方向提供了一定的借鉴。
The researches proposed by this thesis can not only support the secure OS research but also be used a reference of trusted computing-based work.
本文的研究成果不仅为安全操作系统的研究提供了支撑,还为基于可信计算的安全技术的研究方向提供了一定的借鉴。
应用推荐