Examples of using Trusted computing in English and their translations into Bulgarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Trusted computing” would make it pervasive.
It is called"trusted computing" or"palladium".
Trusted computing” would make the practice pervasive.
The proponents of this scheme have given it names such as“trusted computing” and“Palladium.”.
TPMs are defined by Trusted Computing Group(TCG) and also called security chips.
Users must be identified before they can perform any actions controlled by the trusted computing base;
Trusted computing base must manage access of named users to unnamed objects;
There must be formal or informal model of security policy,which is supported by the trusted computing base;
Stability of trusted computing base to penetration attempts must be demonstrated;
The removal of an object from the resources of the trusted computing base must eliminate all traces of its use;
Trusted computing base must manage security markers that are associated with each subject and object;
Testing must show that the implementation of trusted computing base comply with the high-level formal specifications.
Trusted computing base must be internally structured with well distinguished relatively independent modules;
Note: We think it is a mistake to use the enemy's favorable-sounding propaganda terms such as“trusted computing” to describe a malicious plan.
Trusted Computing Base is defined as all the protection mechanisms in the system- hardware, software and firmware.
Hardware and/or software tools must be available that allow regular inspection of the correctness of the trusted computing base hardware components operation;
Trusted Computing Base must provide mutual isolation process by means of separating their address spaces;
A group of experts competent in the implementation of trusted computing base must implement rigorous analysis and testing description of the architecture, the output object code;
Trusted Computing Base must provide mutual isolation process by means of separating their address spaces;
TCG's security standards are all based on the concept of Trusted Computing where a Root of Trust forms the foundation of the device and meets the specific requirements of the device or deployment.
Trusted computing base must ensure implementation of the compulsory management of access for all subjects to all objects;
Trusted computing base must ensure implementation of the compulsory management of access for all subjects to all objects;
Trusted computing base must maintain the area of its own operation, protected from external influences and monitoring attempts during operation;
The trusted computing base must have trusted communication path for the user who performs the initial identification and authentication operations;
Trusted computing base must develop, support and protect the registration information log, which is associated with access to objects by the controlled base;
With a plan they call“trusted computing”, large media corporations(including the movie companies and record companies), together with computer companies such as Microsoft and Intel, are planning to make your computer obey them instead of you.
With a plan they call""“trusted computing”, large media corporations(including the""movie companies and record companies), together with computer companies such""as Microsoft and Intel, are planning to make your computer obey them instead""of you.
Compare the Cloud, a leading independent cloud computing comparison website, announced today the launch of its new cloud comparison tool andmultimedia website that brings together information and evaluation resources about trusted cloud computing vendors to help business users find the right cloud-based IT solutions for their business.
We are excited to bring togethercloud computing knowledge and expertise from a broad spectrum of internationally trusted thought leaders within a dedicated cloud computing website and blogging community.
Notes that trust in cloud computing and cloud providers has been negatively affected by mass surveillance practices;