For the PKI in supporting infrastructures, the theory basis, logic of trust, research envolvement, the developping of architecture, implementing methods and developing technology of elements are described in detail. Security communication protocols between elements are designed and proved.
对于支撑基础设施中的PKI,详述其理论基础、信任逻辑、研究进展、体系结构的发展过程、各部分的实现方式与开发技术,设计各构件之间的安全通信协议,并进行逻辑上的安全证明。
参考来源 - 信息系统纵深防护关键技术研究·2,447,543篇论文数据,部分数据来源于NoteExpress
In the ideal case, the SOA application is centered on business logic, delegating the enforcement of security policies, and handling trust relationships for the infrastructure.
在理想的情况下,SOA应用程序的重点在于业务逻辑、委派安全策略的实现,以及处理基础设施的信任关系。
So before advising less experienced founders who look up to you not to trust others simply because they work in a given industry, think long and hard about the logic and the impact of those words.
因此,当缺乏经验的创始人前来向你取经,在向他们发出忠告,指出某些人仅仅因为从事某个行业就不值得信任之前,不妨深思熟虑,想想这些话是否在理,又会产生什么影响。
Put forward a trust model based on polling logic. Trust is composed of direct trust and indirect trust.
提出了一种基于投票逻辑的信任模型,将信任的计算划分为直接信任和间接信任的计算。
应用推荐