云计算正逐渐侵蚀组织的信任边界(trust boundary),原有的物理、网络、逻辑等责任划分方法已不完全适用。所以在CSA的指南和enisa的保障框架中,开篇所讨论的都是关于用户和CSP的责...
基于28个网页-相关网页
Trust Boundary Violation 违反信任边界规则
以上来源于: WordNet
A trust boundary can be thought of as line drawn through a program.
信任边界可以被看作是通过程序绘制的线条。
Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary .
智能卡系统与传统的计算机系统不同,它不仅仅受制于单一的信任周界。
If a new primary use is anticipated for a component, consider whether this creates a new trust boundary and a need for additional validity checking outside the component.
如果希望组件提供新的主要用途,请考虑这是否会创建新的信任边界和带来在组件外进行额外有效性检查的需求。
应用推荐