• The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.

    授权数据那些属于系统可信计算基础服务器颁发的,因此管理域中可以认为是安全的。

    youdao

  • Some argue that clouds are more secure than many private networks, while others consider that cloud computing may open more security holes.

    有些认为许多私有网络安全一些人则认为计算可能敞开更多安全漏洞。

    youdao

  • Its focus is on providing secure distributed computing, and it also provides interesting constructs for asynchronous programming.

    强调提供安全分布式计算异步编程提供一些有趣的概念

    youdao

  • GNUCITIZEN considered that cloud computing is more secure.

    GNUCITIZEN认为计算安全。

    youdao

  • This short course on high-speed, energy-efficient and secure implementations of cryptosystems, suitable for small and large computing and communication systems.

    是关于密码系统高速节能安全实施短期课程适用小型大型计算通信系统。

    youdao

  • A large amount of secure problems exist in current computing platform due to the weakness of the platform itself.

    目前计算平台存在一些安全问题很多都是由于自身体系结构的安全薄弱性造成的。

    youdao

  • This thesis also presents a method to extend the edge of the control area of the secure OS by adopting trusted computing techniques such as remote attestation and sealed storage.

    最后讨论安全操作系统边界扩展问题,利用可信计算,结合远程证明封装存储相关技术,扩展安全操作系统的控制范围

    youdao

  • The researches proposed by this thesis can not only support the secure OS research but also be used a reference of trusted computing-based work.

    本文研究成果不仅安全操作系统研究提供了支撑为基于可信计算安全技术的研究方向提供一定的借鉴

    youdao

  • The researches proposed by this thesis can not only support the secure OS research but also be used a reference of trusted computing-based work.

    本文研究成果不仅安全操作系统研究提供了支撑为基于可信计算安全技术的研究方向提供一定的借鉴

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定