英语人>网络例句>安全操作系统 相关的搜索结果
网络例句

安全操作系统

与 安全操作系统 相关的网络例句 [注:此内容来源于网络,仅供参考]

Based on predecessors' work, this propose the concept of degenerate test set and an approach that performs test generation and redundancy elimination in the light of the special requirement of verification of the secure operating system.

在总结前人工作的基础上,结合安全操作系统对测试的特殊需求,提出了简并测试集(degenerate test set,简称DTS)的概念,设计了一种使用模型检测的基于安全状态转移的高效测试集生成方法。

Discretionary Access Control is one of necessary and most common secure mechanisms in the secure operating system.

自主访问控制机制是安全操作系统必不可少的、应用最广泛的安全机制之一。

The incapability of access control mechanism of Linux/Unix in defending malware is shown.

第二,设计了适合在安全操作系统中实施的恶意代码防御框架。

Because of the low efficient and the complex protection mechanism for the single address space, the traditional secure operatingsystems mostly adopt the multi-address space technology as the storage model.

这种安全操作系统在存储模型方面多采取多地址空间构造技术,这是由于单地址空间构造技术保护机制复杂,效率很难提高。

While the strict integrity policy of Biba's model can be used to maintain integrity of data in computer systems, the integrity labels of both subjects and objects in a system are always kept static in SIP, which might lead to denial to some non-malicious access requirements and hence decreases the compatibility of applications Dynamic enforcement of this policy is presented, which can increase compatibility of software while keeping system integrity as strictly as SIP can The implementation of...

Biba模型中的严格完整性政策能够有效地保证数据的完整性,但是该政策中主体和客体的完整性标记都是静态不变的,这会限制进程的一些原本合理的活动,从而降低应用程序的兼容性。提出严格完整性政策的动态实施方案,并给出该方案在基于Linux的安全操作系统RFSOS中的实现。该方案既可以保证系统的完整性,又能提高系统的兼容性。实验证明,这种方案对系统的整体效率的影响小于1%。

Because designs of operating systems are quite different, the evaluating system is semiautomatic.

操作系统安全性的测评是实现安全操作系统的一个极为重要的环节,如果不测评、验证所开发操作系统的安全性和该安全性的可信度,那么开发出的安全操作

DAACM is conformant to the requirements of the secure operating system design of Structured Protection Level, and will be used to the practical system design.

DAACM符合论文中给出的《结构化保护级》安全操作系统设计的需要,并将实际应用于该系统的设计之中。

A two-level-caches mechanism is brought in the Generalized Framework for Access Control based on a three levels model of access, and is implemented in Red-Flag Secure OS .

本文以一个商品化安全操作系统的大量实际开发工作为基础,结合国内外在多安全政策支持框架、安全模型和安全操作系统等方面的最新研究成果,对多安全政策支持框架的理论及其在安全操作系统中的实施进行了研究。

It is necessary for unified framework to combine these various security policies and adjust the priority of policies with different application requirements appropriately. By this way, the adaptivity of system can be improved.

需要统一的构架来组合不同的策略,并根据应用环境的不同安全,适当地调整策略的优先级,从而使得安全操作系统具有更好的适应性。

Finally, the development of China's security system as the main problems facing the development and countermeasures.

最后研究了我国安全操作系统发展中所面临的主要问题和发展对策。

第1/6页 1 2 3 4 5 6 > 尾页
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。