Chinese translation for "tcsec"
|
- 可信计算机系统安全评估准则
可信计算机系统评估准则 可信计算机系统评价标准 可信计算机系统评价准则
- Example Sentences:
| 1. | According to trusted compeer seeffiity evaluation standard ( tgskt ) , tfae security level of ^ armostall dbms is c2 , and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource 按照可信计算机评估标准tcsec看,当前多数dbms系统只具备c2级安全性,这种安全性对数据的保护是不够的。提供一个可靠的mlsdbms系统来保护系统信息资源是必要的,迫切的。 | | 2. | This thesis researchs the correlative security evaluation criteria and analyses in detail linux kernel at first . linux kernel is improved at four aspects : access control list , capability , system audit , mandatory access control , based on linux kernel 2 . 4 . 4 on tcsec and the security level of linux is enhanced from cl to bl 本论文首先研究了相关的安全评估标准,并对linux内核进行了详细地分析,然后以tcsec为标准,基于linux内核2 . 4 . 4 ,分别从访问控制表、权能、系统审计以及强制访问控制四个方面时linux内核进行了改进,使linux的安个级别从c1级提高到了b1级。 | | 3. | So the evaluation and certification on information security is a fundmental research area . since us dod developed tcsec in 1985 , the security community in the world has made great progress and at last developed cc ( common criteria ) which latter was publicized as international standard 国际社会中,自从1985年美国国防部发布了tcsec (可信计算机系统评估准则)以来,历经十余年的发展,已经制定了得到广泛认可的cc ( it安全通用评估准则) ,并将其作为国际标准发布。 | | 4. | The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security 第一章对信息保障的历史进行回顾,介绍在信息保障的发展历程中有关信息安全的概念和方法,如:引用监视器( rm ) 、引用确认机制( rvn ) 、可信计算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。 | | 5. | After intruducing the security demand from the computer area , this paper present the designing aim of the real time audit analysis system ( raas ) , considering the trusted computer system evaluation criteria ( tcsec ) of us dod and common criteria for it security evaluation ( cc ) 本文首先介绍了计算机领域的安全需求,根据美国国防部的可信计算机评测标准( tcsec )和计算机信息系统的通用安全评价准则( commoncriteriaforitsecurityevaluation , cc )中提出的安全操作系统的审计标准,提出本系统的设计目的。 | | 6. | So the souece code of postgresql - a kind of free software dbms and its security capability are analyzed firstly , and then based on the carefully analyzing of tcsec & tdi ' s requirements and present mls dbms ' s architecture , technical scheme to retrofit postgresql to a b1 - level mls dbms is given , which including security subsystem and audit subsystem . then some revellent machanism and policy about security label and mac are discueesd 本文分析可信任计算机系统评价准则和可信数据库系统解释的具体要求,对linux环境下的免费数据库系统postgresql的源代码和各种功能进行了初步分析,确定了基于postgresql的b1级安全数据库系统的技术选择及系统结构,提出了安全子系统、审计子系统的总体设计方案,并对设计方案中的安全标示和强制访问控制的相关机制和处理策略进行了分析及论述。 | | 7. | It researches the common evaluation criteria of tcsec , itsec and cc in the world , at the same time it points out their disadvantages . it also introduces the situation of evaluation criteria in our country and compares cc with system evaluation . at last it points out to develop a common evaluation criteria for system evaluation is a difficult task 研究了国际上通用的测评标准: tcsec , itsec和cc ,分析指出了它们的不足,同时也介绍了我国测评标准的发展情况,将cc同系统测评做了一个简单的比较,指出今后制定一部通用的针对系统评估的测评标准的艰巨性。 |
- Similar Words:
- "tcs transportation control system" Chinese translation, "tcs two channel switch" Chinese translation, "tcs26" Chinese translation, "tcsc" Chinese translation, "tcse trunk call sampling equipment" Chinese translation, "tcsegment tcp" Chinese translation, "tcsequence prediction attack" Chinese translation, "tcsf" Chinese translation, "tcsh shell" Chinese translation, "tcsl transistor current steering logic" Chinese translation
|
|
|