We explore the WebSphere II process model and describe the difference between trusted and fenced wrappers; the latter being a prerequisite for exploitation of partitioned database resources.
我们将研究WebSphereII过程模型,并描述受信任的包装器与设防包装器之间的不同;后者是研究分区数据库资源的先决条件。
The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.
比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。
The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.
比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。
应用推荐