Trusted Computing Base - definition. What is Trusted Computing Base
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:     

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

%ما هو (من)٪ 1 - تعريف


Trusted computing base         
SET OF ALL COMPUTER COMPONENTS CRITICAL TO ITS SECURITY
Trusted Computing Base; Trusted computer system; Trusted base
The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system outside the TCB must not be able to misbehave in a way that would leak any more privileges than are granted to them in accordance to the security policy.
Trusted Computing         
TECHNOLOGY DEVELOPED AND PROMOTED BY THE TRUSTED COMPUTING GROUP
Trusted computing; Treacherous computing; Trusted Computing Platform; Treacherous Computing; User:Walklooker/draft for `trusted computing'; Remote attestation; Sealed storage; Endorsement key
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of Confidential Computing.
Trusted path         
MECHANISM THAT PROVIDES CONFIDENCE THAT THE USER IS COMMUNICATING WITH WHAT THE USER INTENDED TO COMMUNICATE WITH
Trusted channel
A trusted path or trusted channel is a mechanism that provides confidence that the user is communicating with what the user intended to communicate with, ensuring that attackers can't intercept or modify whatever information is being communicated.