To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.
该模型以透明计算机系统为基础,利用透明计算技术对计算机内部的安全问题进行控制。
The security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding.
将该安全模式在计算机病毒检测中进行了应用,实现了一个简单的基于二进制编码的计算机病毒检测模拟系统。
With the popularity of EFI, this model has a good prospect in achieving security on computer system.
随着EFI的普及,这将在实现安全计算机系统上具有较好的应用前景。
Starting from the computer network security and the commercial trade security, basing on the technology of network security and commerce security, this paper is presenting the security system model.
从电子商务系统对计算机网络安全,商务交易安全性出发,在分析网络安全技术和交易安全技术的基础上,给出了一种保证电子商务安全的体系结构。
A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.
以攻击图建模方法为基础,提出了一种综合利用网络安全评估工具、模型检验工具的计算机网络脆弱性评估系统的设计方案。
The research of security analysis needed a systemic security analysis model that was from the system resource and security factor of computer network.
安全性分析研究工作需要把计算机网络与安全相关的系统资源和安全因素抽取出来建立一种面向安全性分析的安全模型。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again.
计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.
本文通过对大量的网络弱点的分析,结合网络的特性,建立了安全性分析模型,生成网络攻击图。
Based on the analysis of a lot of network vulnerabilities and the characteristic of computer network, in this paper the model of network security status was built, and attack graphs were generated.
本文通过对大量的网络弱点的分析,结合网络的特性,建立了安全性分析模型,生成网络攻击图。
应用推荐