Examples of using Security module in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
The Linux Security Module.
The Flash Registers are also protected by the Code Security Module(CSM).
AppArmor is another security module based on the ISM.
The DesignWare HDCP 2 2 Embedded Security Module.
One code security module(CSM) is used to protect the flash/OTP and the L0/L1.
People also translate
This includes the implemented Hardware Security Module(HSM).
One code security module(CSM) is used to protect the flash/OTP and the L0/L1/L2/L3 SARAM blocks.
The function in the security_ops structure is installed by the security module.
AppArmor(Application Armor) is a security module originally made by Immunix.
E2EE creates a secured channel between the client's access device andHardware Security Module(HSM).
Therefore vaulting your keys in a hardware security module(HSM) will give you an added layer of protection.
A hardware security module(HSM) is a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle.
Every TC3xx microcontroller now has an integrated hardware security module(HSM), where the keys are generated and stored securely.
Muir said the Seam security module could be a good example of an existing solution that could be added to Java EE through an extension.
The common solution, mentioned in Microsoft paper,is to encrypt each password and store the secret key in a Hardware Security Module(HSM).
Supports a Hardware Security Module for enterprise environments which enables securely issuing new keys to users.
SQL Server 2008 provides excellent support for this need by supporting third-party key management andhardware security module(HSM) products.
SELinux relies on the Linux Security Module Framework to provide the enforcement calls from the standard kernel calls.
Briefly, the Cloud Key Vault uses aspecialized piece of hardware called a Hardware Security Module(HSM) to store encryption keys.
The design supports a Hardware Security Module for enterprise environments which enables securely issuing new keys to users.
For security, each Docker container is isolated through a number of technologies,including SELinux(Security Enhanced Linux) security module, and the cgroups resource allotment tool.
CloudHSM is a hardware security module(HSM) that lets you generate and use your own encryption keys on AWS.
This support is based on an embedded hardware security module(HSM) that follows the highest level of the EVITA security standard.
The hardware security module(HSM) is a dedicated hardware cryptographic processor that is designed for the protection of the encryption key lifecycle.
This way, an administrator can simply pick the security module he wants to use and insert it like any other Linux kernel module. .
The Enforcer is a Linux Security Module designed to improve integrity of a computer running Linux by ensuring no tampering of the filesystem.
SELinux(Security Enhanced Linux) is a Linux kernel security module that allows administrators and users more control over access controls.
AWS CloudHSM is a cloud-based Hardware Security Module(HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.