trusted functionality

trusted functionality
доверительное (трастовое) функционирование, функционирование, соответствующее требованиям безопасности

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "trusted functionality" в других словарях:

  • Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… …   Wikipedia

  • Trusted Computing Group — Infobox Company company name = Trusted Computing Group company company type = Consortium location city = Beaverton, Oregon [ [https://www.trustedcomputinggroup.org/about/contact us/ Trusted Computing Group: Contact Us ] ] location country = USA… …   Wikipedia

  • Hardware Functionality Scan — A Hardware Functionality Scan (HFS) is conducted in order to verify that a certain device is really what it claims to be. It s patented by Microsoft.Some operating systems only send copy protected content, such as movies, to an output device,… …   Wikipedia

  • Security-focused operating system — This is an alphabetical list of operating systems with a sharp security focus. Their order does not imply rank.In our context, Security focused means that the project is devoted to increasing the security as a major goal. As such, something can… …   Wikipedia

  • функциональная возможность, пользующаяся доверием — Функциональная возможность, воспринимаемая как подходящая по определенным критериям, например как установленная в соответствии со стратегией обеспечения безопасности. Рекомендация МСЭ Т X.800. [http://www.rfcmd.ru/glossword/1.8/index.php?a=index&d… …   Справочник технического переводчика

  • функциональная достоверность — доверительность — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом Синонимы доверительность EN trusted functionality …   Справочник технического переводчика

  • XTS-400 — Infobox OS name = XTS 400 website = [http://www.baesystems.com/ProductsServices/bae prod csit xts400.html www.baesystems.com] developer = BAE Systems source model = Closed source latest release version = 6.5 latest release date = August 2008… …   Wikipedia

  • Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • Virtual private network — A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link layer protocols… …   Wikipedia

  • Microkernel — Structure of monolithic and microkernel based operating systems, respectively In computer science, a microkernel is the near minimum amount of software that can provide the mechanisms needed to implement an operating system (OS). These mechanisms …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»