trusted computing

来源:英文词典列表人气: 我来评论


相似词语短语

cloud computing───云计算

precomputing───预计算

quantum computing───量子计算

recomputing───vt.验算;再计算

supercomputing───n.[计]超级计算

telecomputing───n.远程信息处理

trust companies───信托公司

trust company───信托公司

personal computing───个人计算

双语使用场景

Identity management must evolve for the cloud to become a trusted computing platform.───云端的身份管理还需要进化,才能够成为一个值得信赖的计算平台。

Trusted computing fully absorbed this idea, and was applied to a computer in the world.───可信计算充分吸收了这种理念,并将其运用到计算机世界当中。

Trusted Execution environment over Trusted Computing base.───可信执行环境与可信计算基础之比较。

Trusted computing therefore become the main trend of information security is one of the main development direction of the IT industry.───可信计算因此成为信息安全的主要发展趋势之一,也是IT产业发展的主要方向。

Analysis shows that this program has important reference value in the terminal trusted computing security research.───分析认为,该方案对可信计算在终端安全方面的研究有着重要的参考价值。

Finally we note that trusted computing has been the subject of a considerable amount of criticism.───最后,我们主要到可信计算处理器已经成为一门广为批评的话题。

Trusted computing in this form is the ultimate reversal of the human- centric , loosely-coupled design approach of the Internet.───这种形式的可信任计算完全反转了以人为中心、松散结合的互联网设计理念。

China still belongs to the trusted computing start-up stage, is to a higher level development.───中国的可信计算还属于起步阶段,但正在向更高水平发展。

英语使用场景

This paper introduces the trusted computing standard, conception and research organization. problems about network security and puts forward the solutions based on trusted computing.

Trusted Computing Base is an install-time option only and to enable TCB on an existing AIX machine, you need to reinstall the entire AIX operating system.

The concept of trusted computing is introduced by people to improve the current security features of the distributed computing network.

Pushing the device emulation from the hypervisor to user space has some distinct advantages. The most important advantage relates to what's called the trusted computing base (TCB).

The paper analyses a kind of terminal architecture of trusted computing platform, and discusses it's possible application mode. It can reference terminal security.

Trusted Computing Base (TCB) is the security feature available with IBM AIX versions later than version 4.1.

Trusted computing platform is a computer soft hardware entity to solve the hidden trouble of information security, which makes people pay more and more attention to it.

The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.

Finally, we suggest a roadmap of trusted computing standard specifications.