trusted functionality - traduction vers russe
DICLIB.COM
Outils linguistiques IA
Entrez un mot ou une phrase dans n'importe quelle langue 👆
Langue:     

Traduction et analyse des mots par intelligence artificielle

Sur cette page, vous pouvez obtenir une analyse détaillée d'un mot ou d'une phrase, réalisée à l'aide de la meilleure technologie d'intelligence artificielle à ce jour:

  • comment le mot est utilisé
  • fréquence d'utilisation
  • il est utilisé plus souvent dans le discours oral ou écrit
  • options de traduction de mots
  • exemples d'utilisation (plusieurs phrases avec traduction)
  • étymologie

trusted functionality - traduction vers russe

Trusted-client; Trusted-Client; Trusted Client

trusted functionality      
доверительное (трастовое) функционирование, функционирование, соответствующее требованиям безопасности
trusted path         
MECHANISM THAT PROVIDES CONFIDENCE THAT THE USER IS COMMUNICATING WITH WHAT THE USER INTENDED TO COMMUNICATE WITH
Trusted channel
защищенный канал; защищенный маршрут
trusted computing base         
SET OF ALL COMPUTER COMPONENTS CRITICAL TO ITS SECURITY
Trusted Computing Base; Trusted computer system; Trusted base
See: TCB

Définition

functionality
The functionality of a computer or other machine is how useful it is or how many functions it can perform.
It is significantly more compact than any comparable laptop, with no loss in functionality.
N-UNCOUNT

Wikipédia

Trusted client

In computing, a trusted client is a device or program controlled by the user of a service, but with restrictions designed to prevent its use in ways not authorized by the provider of the service. That is, the client is a device that vendors trust and then sell to the consumers, whom they do not trust. Examples include video games played over a computer network or the Content Scramble System (CSS) in DVDs.

Trusted client software is considered fundamentally insecure: once the security is broken by one user, the break is trivially copyable and available to others. As computer security specialist Bruce Schneier states, "Against the average user, anything works; there's no need for complex security software. Against the skilled attacker, on the other hand, nothing works." Trusted client hardware is somewhat more secure, but not a complete solution.

Trusted clients are attractive to business as a form of vendor lock-in: sell the trusted client at a loss and charge more than would be otherwise economically viable for the associated service. One early example was radio receivers that were subsidized by broadcasters, but restricted to receiving only their radio station. Modern examples include video recorders being forced by law to include Macrovision copy protection, the DVD region code system and region-coded video game consoles.

Trusted computing aims to create computer hardware which assists in the implementation of such restrictions in software, and attempts to make circumvention of these restrictions more difficult.

Traduction de &#39trusted functionality&#39 en Russe