英语翻译最好有中文翻译是电子信息技术类的。电子专业英语的作业。最好是比较新的内容。

来源:学生作业帮助网 编辑:六六作业网 时间:2024/12/26 20:08:22
英语翻译最好有中文翻译是电子信息技术类的。电子专业英语的作业。最好是比较新的内容。英语翻译最好有中文翻译是电子信息技术类的。电子专业英语的作业。最好是比较新的内容。英语翻译最好有中文翻译是电子信息技术

英语翻译最好有中文翻译是电子信息技术类的。电子专业英语的作业。最好是比较新的内容。
英语翻译
最好有中文翻译
是电子信息技术类的。电子专业英语的作业。
最好是比较新的内容。

英语翻译最好有中文翻译是电子信息技术类的。电子专业英语的作业。最好是比较新的内容。
可信电子信息系统
可信计算机系统(Trusted Computer System)的概念是美国国防部首先提出来的,为了保证计算机系统的保密性,美国国防部于20世纪80年代提出了一套访问控制机制来增强系统的可信性,并制定了可信计算机系统评价准则(TCSEC).TCSEC((从橘皮书到彩虹系列)对信息系统的几个关键环节:计算机操作系统、数据库、计算机网络的安全性均提出了可信安全评价准则.准则中,从用户登录、授权管理、访问控制、审计跟踪、隐通道分析、可信通 计算机系统 电子信息系统道建立、安全检测、生命周期保障、文本写作、用户指南均提出了规范性要求.并根据所采用的安全策略、系统所具备的安全功能将系统分为A、B (BL B2、B3)、C (Cl、C2)、D四类七个安全级别.这些准则对研究导向、规范生产、指导用户选型、提供检查机关评价依据,都起了良好的推动作用.但其主要考虑的安全问题大体上还局限于信息的保密性,他所依据的安全模型:Bell &LapadIlia安全模型所制定的最重要的安全(保密)原则:严禁上读、下写(no read up no write down)就是主要针对信息的保密要求.
90年代西欧四国(英、法、德、荷)又提出了信息技术安全评价准则(ITSEC).ITSEC(欧洲白皮书)除了吸收TCSEC的成功经验外,首次提出了信息安全的保密性、完整性、可用性的概念,把可信计算机的概念提高到可信信息技术的高度上来认识.他们的工作成为欧共体信息安全计划的基础,并对国际信息安全的研究、实施带来深刻的影响.
1996年国际上的六个国家(美、加、英、法、德、荷)又联合提出了信息技术安全评价通用准则(CO.CC的基础是欧洲的ITSEC,美国的包括TCSEC在内的新的联邦评价标准,加拿大的CTCPEC,以及国际标准化组织ISO:SC27 WG3的安全评价标准.
The credibility of electronic information systems
Trusted Computer System (Trusted Computer System) of the U.S.Department of Defense is a concept first put forward in order to ensure the confidentiality of computer systems,the U.S.Department of Defense in the 1980s,a set of access control mechanisms to enhance the credibility of the system And the development of the Trusted Computer System Evaluation criteria (TCSEC).TCSEC ((from the Orange Book to the Rainbow series) for the information systems of several key components:computer operating systems,databases,computer network security are put forward a credible evaluation of the safety guidelines.Norms,from the user log on to empower the management,Access control,audit trails,hidden channels,the credibility of the computer-systems Road,the establishment of electronic information systems,safety inspection,protection of the life cycle,text writing,User's Guide have made regulatory requirements.And in accordance with the security policies adopted by the system by With the safety features of the system is divided into A,B (BL B2,B3),C (Cl,C2),D four of the seven-level security.These guidelines for the research-oriented,standardized production,guiding the user selection of the inspection bodies Based on the evaluation,all played a role in promoting the good.But the main consideration of security issues in general is also limited to the confidentiality of information,based on the security model:Bell & LapadIlia security model developed by the most important security (secrecy):Strictly on reading,writing under the (no read up no write down) is the main message for the request for confidentiality.
90 of the four countries in Western Europe (Britain,France,Germany and the Netherlands) also made information technology security evaluation criteria (ITSEC).ITSEC (White Paper on Europe) in addition to absorbing the successful experiences of TCSEC,for the first time the information security of the confidentiality,integrity and availability of the concept,the credibility of the concept of a computer to the credibility of information technology onto a high degree of understanding.Their work European information security has become the foundation of the program,and international information security research,the implementation of a profound impact.
In 1996 the international community of the six countries (the United States,Canada,Britain,France,Germany and the Netherlands) jointly put forward a common information technology security evaluation criteria (CO.CC is based on the European ITSEC,the United States,including the new TCSEC The federal evaluation criteria,Canada's CTCPEC,as well as the International Organization for Standardization ISO:SC27 WG3 security evaluation criteria.