安全操作系统
- 与 安全操作系统 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Based on predecessors' work, this propose the concept of degenerate test set and an approach that performs test generation and redundancy elimination in the light of the special requirement of verification of the secure operating system.
在总结前人工作的基础上,结合安全操作系统对测试的特殊需求,提出了简并测试集(degenerate test set,简称DTS)的概念,设计了一种使用模型检测的基于安全状态转移的高效测试集生成方法。
-
Discretionary Access Control is one of necessary and most common secure mechanisms in the secure operating system.
自主访问控制机制是安全操作系统必不可少的、应用最广泛的安全机制之一。
-
The incapability of access control mechanism of Linux/Unix in defending malware is shown.
第二,设计了适合在安全操作系统中实施的恶意代码防御框架。
-
Because of the low efficient and the complex protection mechanism for the single address space, the traditional secure operatingsystems mostly adopt the multi-address space technology as the storage model.
这种安全操作系统在存储模型方面多采取多地址空间构造技术,这是由于单地址空间构造技术保护机制复杂,效率很难提高。
-
While the strict integrity policy of Biba's model can be used to maintain integrity of data in computer systems, the integrity labels of both subjects and objects in a system are always kept static in SIP, which might lead to denial to some non-malicious access requirements and hence decreases the compatibility of applications Dynamic enforcement of this policy is presented, which can increase compatibility of software while keeping system integrity as strictly as SIP can The implementation of...
Biba模型中的严格完整性政策能够有效地保证数据的完整性,但是该政策中主体和客体的完整性标记都是静态不变的,这会限制进程的一些原本合理的活动,从而降低应用程序的兼容性。提出严格完整性政策的动态实施方案,并给出该方案在基于Linux的安全操作系统RFSOS中的实现。该方案既可以保证系统的完整性,又能提高系统的兼容性。实验证明,这种方案对系统的整体效率的影响小于1%。
-
Because designs of operating systems are quite different, the evaluating system is semiautomatic.
操作系统安全性的测评是实现安全操作系统的一个极为重要的环节,如果不测评、验证所开发操作系统的安全性和该安全性的可信度,那么开发出的安全操作
-
DAACM is conformant to the requirements of the secure operating system design of Structured Protection Level, and will be used to the practical system design.
DAACM符合论文中给出的《结构化保护级》安全操作系统设计的需要,并将实际应用于该系统的设计之中。
-
A two-level-caches mechanism is brought in the Generalized Framework for Access Control based on a three levels model of access, and is implemented in Red-Flag Secure OS .
本文以一个商品化安全操作系统的大量实际开发工作为基础,结合国内外在多安全政策支持框架、安全模型和安全操作系统等方面的最新研究成果,对多安全政策支持框架的理论及其在安全操作系统中的实施进行了研究。
-
It is necessary for unified framework to combine these various security policies and adjust the priority of policies with different application requirements appropriately. By this way, the adaptivity of system can be improved.
需要统一的构架来组合不同的策略,并根据应用环境的不同安全,适当地调整策略的优先级,从而使得安全操作系统具有更好的适应性。
-
Finally, the development of China's security system as the main problems facing the development and countermeasures.
最后研究了我国安全操作系统发展中所面临的主要问题和发展对策。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。