√在线天堂中文最新版网,97se亚洲综合色区,国产成人av免费网址,国产成人av在线影院无毒,成人做爰100部片

簡體版 繁體版
Login Sign Up

tcsec in Chinese

Pronunciation:
How to pronounce "tcsec""tcsec" in a sentence"tcsec" meaning

Translationmobile phoneMobile

  • 可信計算機系統(tǒng)安全評估準則
  • 可信計算機系統(tǒng)評估準則
  • 可信計算機系統(tǒng)評價標準
  • 可信計算機系統(tǒng)評價準則

Examples

  • According to trusted compeer seeffiity evaluation standard ( tgskt ) , tfae security level of ^ armostall dbms is c2 , and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource
    按照可信計算機評估標準tcsec看,當(dāng)前多數(shù)dbms系統(tǒng)只具備c2級安全性,這種安全性對數(shù)據(jù)的保護是不夠的。提供一個可靠的mlsdbms系統(tǒng)來保護系統(tǒng)信息資源是必要的,迫切的。
  • This thesis researchs the correlative security evaluation criteria and analyses in detail linux kernel at first . linux kernel is improved at four aspects : access control list , capability , system audit , mandatory access control , based on linux kernel 2 . 4 . 4 on tcsec and the security level of linux is enhanced from cl to bl
    本論文首先研究了相關(guān)的安全評估標準,并對linux內(nèi)核進行了詳細地分析,然后以tcsec為標準,基于linux內(nèi)核2 . 4 . 4 ,分別從訪問控制表、權(quán)能、系統(tǒng)審計以及強制訪問控制四個方面時linux內(nèi)核進行了改進,使linux的安個級別從c1級提高到了b1級。
  • So the evaluation and certification on information security is a fundmental research area . since us dod developed tcsec in 1985 , the security community in the world has made great progress and at last developed cc ( common criteria ) which latter was publicized as international standard
    國際社會中,自從1985年美國國防部發(fā)布了tcsec (可信計算機系統(tǒng)評估準則)以來,歷經(jīng)十余年的發(fā)展,已經(jīng)制定了得到廣泛認可的cc ( it安全通用評估準則) ,并將其作為國際標準發(fā)布。
  • The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security
    第一章對信息保障的歷史進行回顧,介紹在信息保障的發(fā)展歷程中有關(guān)信息安全的概念和方法,如:引用監(jiān)視器( rm ) 、引用確認機制( rvn ) 、可信計算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。
  • After intruducing the security demand from the computer area , this paper present the designing aim of the real time audit analysis system ( raas ) , considering the trusted computer system evaluation criteria ( tcsec ) of us dod and common criteria for it security evaluation ( cc )
    本文首先介紹了計算機領(lǐng)域的安全需求,根據(jù)美國國防部的可信計算機評測標準( tcsec )和計算機信息系統(tǒng)的通用安全評價準則( commoncriteriaforitsecurityevaluation , cc )中提出的安全操作系統(tǒng)的審計標準,提出本系統(tǒng)的設(shè)計目的。
  • So the souece code of postgresql - a kind of free software dbms and its security capability are analyzed firstly , and then based on the carefully analyzing of tcsec & tdi ' s requirements and present mls dbms ' s architecture , technical scheme to retrofit postgresql to a b1 - level mls dbms is given , which including security subsystem and audit subsystem . then some revellent machanism and policy about security label and mac are discueesd
    本文分析可信任計算機系統(tǒng)評價準則和可信數(shù)據(jù)庫系統(tǒng)解釋的具體要求,對linux環(huán)境下的免費數(shù)據(jù)庫系統(tǒng)postgresql的源代碼和各種功能進行了初步分析,確定了基于postgresql的b1級安全數(shù)據(jù)庫系統(tǒng)的技術(shù)選擇及系統(tǒng)結(jié)構(gòu),提出了安全子系統(tǒng)、審計子系統(tǒng)的總體設(shè)計方案,并對設(shè)計方案中的安全標示和強制訪問控制的相關(guān)機制和處理策略進行了分析及論述。
  • It researches the common evaluation criteria of tcsec , itsec and cc in the world , at the same time it points out their disadvantages . it also introduces the situation of evaluation criteria in our country and compares cc with system evaluation . at last it points out to develop a common evaluation criteria for system evaluation is a difficult task
    研究了國際上通用的測評標準: tcsec , itsec和cc ,分析指出了它們的不足,同時也介紹了我國測評標準的發(fā)展情況,將cc同系統(tǒng)測評做了一個簡單的比較,指出今后制定一部通用的針對系統(tǒng)評估的測評標準的艱巨性。

Other Languages

What is the meaning of tcsec in Chinese and how to say tcsec in Chinese? tcsec Chinese meaning, tcsec的中文,tcsec的中文tcsec的中文,translation, pronunciation, synonyms and example sentences are provided by ichacha.net.