...学术交流_中国信息安全博士网 关键词: Rootkit 可信计算 Hypervisor 策略 [gap=850]Key words: Rootkit, the Trusted Computing, Hypervisor, policy ...
基于2个网页-相关网页
The security model is the core content in the trusted information system and the key field of the trusted computing research.
安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
应用推荐