- trusted process
- доверительный процесс (требующий специальных мер безопасности)
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
Trusted Execution Technology — (TET or TXT), formerly known as LaGrande Technology is a key component of Intel s initiative of safer computing . Intel Trusted Execution Technology (Intel TXT) is a hardware extension to some of Intel s microprocessors and respective chipsets,… … Wikipedia
Trusted timestamping — is the process of securely keeping track of the creation and modification time of a document. Security here means that no one not even the owner of the document should be able to change it once it has been recorded provided that the timestamper s … Wikipedia
Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… … Wikipedia
Trusted computing base — The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs occurring inside the TCB might jeopardize the security properties of… … Wikipedia
Process management (computing) — Operating systems … Wikipedia
Knowledge process outsourcing — (KPO) is a form of outsourcing, in which knowledge related and information related work is carried out by workers in a different company or by a subsidiary of the same organization, which may be in the same country or in an offshore location to… … Wikipedia
Principle of least privilege — In information security, computer science, and other fields, the principle of least privilege, also known as the principle of minimal privilege or just least privilege, requires that in a particular abstraction layer of a computing environment… … Wikipedia
TPM — Trusted Platform Module (Computing » Drivers) Trusted Platform Module (Computing » Hardware) *** Total Productive Maintenance (Governmental » Military) *** Total Productive Maintenance (Business » Products) * The Phantom Menace (Miscellaneous »… … Abbreviations dictionary
Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… … Wikipedia
XTS-400 — Infobox OS name = XTS 400 website = [http://www.baesystems.com/ProductsServices/bae prod csit xts400.html www.baesystems.com] developer = BAE Systems source model = Closed source latest release version = 6.5 latest release date = August 2008… … Wikipedia