Trusted Computing oor Sjinees

Trusted Computing

Vertalings in die woordeboek Engels - Sjinees

可信计算

Key generation, backup and migration method and system based on trusted computing
一种基于可信计算的密钥生成、备份和迁移方法及系统
HeiNER-the-Heidelberg-Named-Entity-...

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

Soortgelyke frases

Trusted Computing Group
信賴運算群組 · 受信任的计算组

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
trusted computer system evaluation criteria
新地 球?? 军 的 任? 务 是 解? 决 全世界 的?? 争UN-2 UN-2
With trusted computers and devices, you don’t need to enter a verification code each time you sign in.
我們 的 領袖 們 在 竭力 地 給 邱吉爾 起 綽號support.google support.google
Key generation, backup and migration method and system based on trusted computing
我? 这 里 有 家? 乡 的? 红 酒 和 白? 兰 地 。? 来 吧 。patents-wipo patents-wipo
And sometimes we even have to trust computers.
法? 国 人 迫使 他 戴??? 个 度? 过 余生ted2019 ted2019
They also claim that Trusted Computing will allow computers and servers to offer improved computer security over that which is currently available.
給 大家 變 個 戲法 怎麼樣 ?LASER-wikipedia2 LASER-wikipedia2
The present invention is applicable to the technical field of computers, and provides a key generation, backup and migration method and system based on trusted computing.
埃 迪 ,? 这 是 我的?? 业 我 不能 那 么? 说patents-wipo patents-wipo
Designed or modified to provide certified or certifiable "multilevel security" or user isolation at a level exceeding Class # of the Trusted Computer System Evaluation Criteria (TCSEC) or equivalent
有人 死了,? 这 再 普通 不? 过MultiUn MultiUn
In July 1995, Windows NT 3.5 with Service Pack 3 was rated by the National Security Agency as complying with Trusted Computer System Evaluation Criteria (TCSEC) C2 criteria.
其中 有? 狮 子 、?? 驼 、 大象 、? 马 和 麒麟LASER-wikipedia2 LASER-wikipedia2
Designed or modified to provide certified or certifiable "multilevel security" or user isolation at a level exceeding Class B2 of the Trusted Computer System Evaluation Criteria (TCSEC) or equivalent;
袠屑邪 谢懈 胁械褋褌懈 芯写 袦邪褉褌懈薪邪? 邪? 懈? 械 褋 褌 懈芯?? 邪 褉 懈 薪 邪?UN-2 UN-2
The United States Government Department of Defense (DoD) created the Trusted Computer System Evaluation Criteria (TCSEC) which is a standard that sets basic requirements for assessing the effectiveness of security.
這 只 是 為了 証明 內心 的 感情LASER-wikipedia2 LASER-wikipedia2
Some security experts have spoken out against Trusted Computing, believing it will provide computer manufacturers and software authors with increased control to impose restrictions on what users are able to do with their computers.
短期 应收 款项 的 预计 未来 现金 流量 与 其 现 值 相差 很 小 的 , 在 确定 相关 减值 损失 时 , 不 对 其 预计 未来 现金 流量 进行 折 现 。LASER-wikipedia2 LASER-wikipedia2
Thrun was interviewed in the 2018 documentary on artificial intelligence Do You Trust This Computer?.
哦 , 我? 们 看 起? 来 像是 神? 经 病 , 是 吧WikiMatrix WikiMatrix
If implemented, trusted computing would make software tampering of protected programs at least as difficult as hardware tampering, as the user would have to hack the trust chip to give false certifications in order to bypass remote attestation and sealed storage.
我? 们 想要 在 巴士站 接 你, 但是LASER-wikipedia2 LASER-wikipedia2
In current Trusted Computing specifications, there are two hardware components: the Trusted Platform Module (TPM), which will provide secure storage of cryptographic keys and a secure cryptographic co-processor, and a curtained memory feature in the Central Processing Unit (CPU).
这篇文章已经被取消或替换 。LASER-wikipedia2 LASER-wikipedia2
According to the present invention, the generation, backup, recovery and migration of the key are realized based on a trusted computing module in the trusted computing, thereby improving the security of the key in the generation, backup, recovery and migration processes.
有客 人 的? 时 候 你 嘴巴 干?? patents-wipo patents-wipo
There is concern amongst critics that it will not always be possible to examine the hardware components on which Trusted Computing relies, the Trusted Platform Module, which is the ultimate hardware system where the core 'root' of trust in the platform has to reside.
要是 我 用力 凝?? 这 把? 它 就?? 着 火 然后 熔化 的WikiMatrix WikiMatrix
Owner override offers the security and enforcement benefits to a machine owner, but does not allow him to trust other computers, because their owners could waive rules or restrictions on their own computers.
发生什么事了? 生 什 么 事 了?- 我? 给 你?? 来 了 一? 个 非常 不好 的 消息LASER-wikipedia2 LASER-wikipedia2
On # anuary # became an accredited member of the Trusted Introducer- the trust network for computer security incident response team and computer emergency response teams in Europe
我 常 嘲笑 他 比 我? 还 墨守?? 规MultiUn MultiUn
On 16 January 2009 CERT-LT became an accredited member of the Trusted Introducer — the trust network for computer security incident response team and computer emergency response teams in Europe.
如果 你 丈夫 告? 诉 你 他? 将 要 离? 开 一年 ,到 很多??? 国 度 拍? 摄 系列?? 录 片 ,UN-2 UN-2
Miura decided to use trusted tactics instead of an anti-computer strategy.
停止服务进程(忘记所有的密码LASER-wikipedia2 LASER-wikipedia2
What framework would be needed, given the complexity of cloud computing, to build trust in the cloud, especially in terms of confidentiality and privacy?
但 他 整 晚都?? 担 心 求 你 了? 让 我UN-2 UN-2
At its forty-eighth session, the Commission had instructed the Secretariat to conduct preparatory work on identity management and trust services, cloud computing and mobile commerce for further discussion in the Working Group, following the current work on transferable records.
它 意味? 着 我? 们 步入 正? 轨 了UN-2 UN-2
To protect your privacy, share your computer with people that you trust.
對了 可是 斑馬 否決 了 它support.google support.google
The Commission accordingly instructed the Secretariat to conduct preparatory work on identity management and trust services, cloud computing and mobile commerce, including through the organization of colloquia and expert group meetings, for future discussion at the Working Group level following the current work on electronic transferable records.
小 锌褉械屑邪薪 褋懈 蟹邪 芯胁芯? 褉 械 屑 邪 薪 褋 懈蟹邪 芯? 芯?UN-2 UN-2
In NGSCB, there are two software components, the Nexus, a security kernel that is part of the Operating System which provides a secure environment (Nexus mode) for trusted code to run in, and Nexus Computing Agents (NCAs), trusted modules which run in Nexus mode within NGSCB-enabled applications.
你 今晚 睡哪 ? 保安 , 你?? 吗 ?LASER-wikipedia2 LASER-wikipedia2
170 sinne gevind in 15 ms. Hulle kom uit baie bronne en word nie nagegaan nie.