However, as you will see in later parts of this series, cloud computing also raises questions of ownership, security, and cost.
然而,正如您在本系列后面的部分看到的,云计算也带来了所有权、安全与成本方面的问题。
While the benefits of using computing in the clouds are well known, its adoption is hindered by security concerns.
使用云计算的好处已经是众所周知的,然而安全方面的考虑是采用它的障碍。
In general, the more you do online - social networking, cloud computing etc - the more your privacy and security are at risk.
总的来说,你的网上操作——网络社交、云信息处理等——越多,你的隐私和安全所受风险则越大。
In part 3, the final part of this series, you will examine the issues of governance and security that come with cloud computing.
在第3部分,即本系列的最后一部分,您将了解云计算中的治理和安全问题。
Finally, I'll look at what criteria you need to test how well SaaS is performing in cloud computing and some security issues with SaaS.
最后介绍测试SaaS在云计算中的执行情况所需的条件,以及SaaS在安全性方面的问题。
Degree required: Associate's or bachelor's degree in computing or certifications in information security.
文凭要求:计算机学士学位或大专学位,或信息安全认证。
With the use of systems in the cloud, there is the ever present risk of data security, connectivity, and malicious actions interfering with the computing processes.
如果使用云中的系统,在数据安全性和连接性方面会有风险,恶意活动也可能会妨碍计算过程。
The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.
可信计算是在计算和通信系统中广泛使用基于硬件安全模块支持下的可信计算平台,以提高整体的安全性。
Computing: Quantum cryptography is unbreakable in theory. But like any security system, in practice it is only as safe as its weakest link.
计算:量子密码理论上是无法破解的。但和任何安全系统一样,在实践中其安全度取决于系统里最薄弱的一环。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
This dissertation studies how to build trust model for grid computing in order to find out malicious users and improve security and reliability of system.
本文研究如何在网格计算中建立信任模型,来排除内部恶意节点,提高系统的安全可靠程度。
Reviews the basic content of cloud computing and its security issues in details.
并详细介绍当今云计算的基本内容以及其中的安全问题。
A remote password authentication scheme is given only applying some arithmetic operation and an one_way function in field GF (p), and analyses this schemes security and computing property.
应用GF (P)上的代数运算和单向函数,构造了一种不用通行字表的远程通行字认证方案,并对该方案进行了安全性分析和计算特性分析。
The security model is the core content in the trusted information system and the key field of the trusted computing research.
安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域。
In the same time, Trusted Computing platform can prevent the run of virus program and malicious code. This platform also solves the security problem of encrypt system and run environment.
同时,能够阻止病毒程序、恶意代码程序的运行,这样可信计算平台解决了加密系统及其运行环境的安全性问题。
There are two classes of security problems in distributed computing system, security of hosts and security of distributed applications.
分布式计算系统安全问题分为两大类:分布式计算的安全和主机的安全。
LI Dong, born in 1967, professor. His research interests include computer network security, parallel computing, computer architecture, and computer graphics.
李东,男,1967年生,教授,主要研究领域为网络信息安全技术,并行计算,计算机系统结构,计算机图形学等。
In the GT2, the earlier version of GT, it relies on grid security infrastructure (GSI) to guarantee the security of the grid computing circumstances.
早期版本gt2,是通过网格安全基础设施(GSI)来保障网格计算环境的安全。
Then common reconfigurable computing platforms are introduced and also the application models of reconfigurable computing in areas such as signal processing and network security.
然后介绍了几种常见的可重构计算平台,以及可重构计算在信号处理、网络安全等领域的应用模型。
The security analysis can prove that the protocol can ensure the confidentiality and reliability of key-exchange, and the integrity and anonymous of host in trusted computing environments.
经安全性分析证明,该协议可以在可信计算环境下保证密钥交换的机密性与可靠性,同时还可以保证主机完整性与主机匿名性。
The Grid MP platform is a comprehensive architecture that was built from the ground up to tackle the unique challenges of security, scalability, and manageability in distributed computing.
网格MP平台是一个综合性的架构,是分布式计算建立在从基础应用直到解决特别的安全、可测量性和可管理性 的挑战上 的。
With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.
随着信息技术的飞速发展,可信计算机在安全方面的优越性越来越受到国内外计算机领域工作者的重视。
Cloud computing is no different, even though the risks of not having a sound security strategy are much greater in cloud computing.
云计算也一样,即使没有听到在云计算方面的安全策略的冒险。
As a new computing paradigm, ubiquitous computing has generally come into our life. At the same time, security in ubiquitous computing is attracting more and more attention.
作为一种新的计算模式,普适计算在逐渐进入我们生活的同时,普适计算下的安全也引起了越来越多的关注。
This book describes in detail with the crane hoisting the computing and security technologies.
本书详尽介绍了与起重吊装有关的计算和安全技术。
The alliance, which plans to make its first big splash at the upcoming RSA Conference, was formed to promote security best practices in a cloud computing environment.
该联盟准备在即将召开的RSA数据安全展示会议上进行首次亮相。云安全联盟成立的目的是为了在云计算环境下提供最佳的安全方案。
A security model of services computing is presented in this paper. Main idea and advantages of trust domain based security model are analyzed.
本文给出了服务计算的安全模型,分析了这种应用逻辑与安全策略分离的基于信任域的安全模型的主要思想和优点。
A security model of services computing is presented in this paper. Main idea and advantages of trust domain based security model are analyzed.
本文给出了服务计算的安全模型,分析了这种应用逻辑与安全策略分离的基于信任域的安全模型的主要思想和优点。
应用推荐