您要查找的是不是:
- secure operating system model 安全操作系统
- How to design and develop the audit module for secure operating system of B3 level were discussed. 摘要论述了基于B3级安全操作系统审计报警模块增强策略与方法。
- After extension, new security properties of users are added to the identification and authentication system in order to support RBAC, DTE and MAC in the secure operating system. 扩展后的标识鉴别机制增加了新的用户安全属性,以增加对安全操作系统下RBAC、DTE和MAC三种访问控制的支持。
- design of secure operating system 安全操作系统设计
- According to Raymond and fellow open source supporters, open source is the only real option for secure operating systems. 根据Raymond和其他开放源码的拥护者,开放源码是安全操作系统唯一真正的选择。
- Gemini Multiprocessing Secure Operating System 双子星多重处理安全运作系统
- Kernalized Secure Operating System 心安全操作系统
- verifiable secure operating system 检验可靠的操作系统
- kernelized secure operating system 内核化的安全操作系统
- implementation of secure operating system 安全操作系统的实现
- Especially it was a great deal applied to the server, the problem that aim at Linux Operating System's security more and more stand out. It is never existent absoluteness security Operating System. 随着Linux操作系统越来越广泛的运用,尤其是在服务器方面的大量应用,针对它的安全问题也越来越突出,没有绝对安全的操作系统。
- Third, based on the thorough research of the multilevel security models, integrity models and Role-Based Access Control Models (RBAC), a modified BLP model (MBLP) is designed and applied in a secure operating system developed independently. 第三,在深入研究多级安全模型、完整性模型、基于角色的授权模型等基础上,首先提出了一个修改BLP模型(MBLP)的方案,并在一个自主开发的安全操作系统中得到了应用;
- In the Linux kernel-based Distributed and Parallel Security Operating System (DPSOS), the system security is not assured because of the lack of global user identification and access right managing mechanism. 在基于Linux内核的分布式并行安全操作系统中,由于没有全局一致的用户鉴别和访问权限管理机制,对系统的安全带来危害。
- A trademark for a microcomputer operating system. 微机系统管理一种微机操作系统的商标
- Keywords secure operating system;access control;MACM method;anomaly detection;system call;context-sensitive;CPDA model;data flow;2PA method; 安全操作系统;访问控制;MACM策略;异常检测;系统调用;上下文敏感;CPDA模型;数据流;2PA方法;
- provably secure operation system 可证明安全操作系统
- Next the system model is simulated and the simulation result sh... 最后对制粒湿度控制系统进行了硬件和软件设计。
- BLP-based Information Security Model in Secure Operating System 基于BLP的安全操作系统信息安全模型
- Their feasibility is preyed by the low rank system model. 然后由低阶系统模型验证了该方法的可行性;
- A simple three-zone VAV system model is built in EnergyPlus (E+). 一个简单的三区域VAV系统模型在E+中建立。
