您要查找的是不是:
- The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain. 授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
- Trusted computing base of computer information system 计算机信息系统可信计算基
- Network Trusted Computer Base 网络依赖的计算机数据库
- Trusted Computer Base 置信计算机基地
- Trusted Computing Based User Authentication for Mobile Equipment 基于可信计算的移动终端用户认证方案
- Trusted Computer System Evaluation Criteria(TCSEC), DOD5200.28-STD Dec 1985. 行政机关资讯系统安全稽核制度之研究;1996;行政院研考会编印.
- How Trustworthy Is Trusted Computing? 可信计算有多可信赖?
- trusted computing base 可信计算基
- Private computers are also known as trusted computers. 私人计算机也称为受信任的计算机。
- Adaptive Server Anywhere 7.0 Was awarded a TCSEC (Trusted Computer System Evaluation Criteria) C2 security rating from the U.S. Government. Adaptive Server Anywhere 7.;0荣获美国政府授予的TCSEC(可信计算机系统评估标准)C2安全等级。
- Why do you need a PTW Computer Based Training Program? 为什么您需要工作许可证电脑培训课程?
- Nikos Drakos, Computer BASEd Learning Unit, UniversITy of Leeds. 作者:佚名技巧来源:不详点击数:更新时间:2005-11-26
- It analyzed characteristic of the computer base map commonly used in the present and introduced the prospect of blueprinting paper in our country. 该文对我国晒图纸的前景和当前普遍采用电脑底图的特点,进行了分析,并对提高分辨力的实验作了详细叙述。
- NATIONAL COMPUTER SECURITY CENTER. United States. Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria[Z]. NCSC-TG-021, April 1991. 蒋继洪.;计算机系统、数据库系统和通信网络的安全与保密[M]
- Cybersecurity and Domestic Surveillance or Why Trusted Computing Shouldn't Be? 数字安全与国内监督,或为何原本可信的计算机面目全非?
- By means of authorware on windows platform,how to develop the CAI teaching software for computer base of university with vividness,beautification and effectiveness. 本文讲述了在Windows平台上;如何利用多媒体著作工具Authorware开发出图文并茂、形象生动、美观实用的《大学计算机基础》cai教学软件.
- Lev has also worked in the areas of application security and trusted computing. Lev也从事于应用程序安全和可信的计算方面的研究。
- Abstract: To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm. 文章摘要: 为了解决日益严重的局域网的安全问题,提出一种安全的基于网络的计算机系统模型。
- On the base of adequate study on the properties and control method of walking-robot, we designed a control system of sir~le-chip computer based on DistributedControl Theory. 在对步行式机器人的特点和控制方法充分研究的基础上,研制出了分布式单片微型计算机控制系统。
- Trusted Computing is one of the hottest topics in the information security field. 可信计算是目前信息安全领域研究的热点问题之一。
- 今日热词
-
- 深远海浮式风电平台 - deep-sea floating wind power platform
-
- 京雄高速公路 - Beijing-Xiongan expressway
-
- 农业及相关产业增加值 - the added value of agriculture and related industries