必应词典为您提供Multiple-Independent-Levels-of-Security的释义,网络释义: 多重独立安全等级;多个独立的安全水平;
MILCOM 2001, v.1Rohwer, K., Krout, T. (2001) Multiple levels of security in support of highly mobile tactical internets-ELB ACTD. Proceedings of Military Communications Conference on Communications for Network-Centric Operations: Creating the Information Force. IEEE press, McLean, pp. 81-86...
MULTIPLE INDEPENDENT LEVELS OF SECURITY CONTAINING MULTI-LEVEL SECURITY INTERFACEMethods and systems for enabling security in transferring data from a single level MILS partition to the multiple level LAN. When a frame is received from an external stack via a network interface card, the frame ...
The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with multiple independent levels of security (MILS). Each level of MILS has a computer sub-network with networked workstations...
Recent improvements in the performance and security architecture of modern microprocessor designs have made the implementation of the Multiple Independent Levels of Security (MILS) software architecture technically feasible and at affordable cost. Reaching this inflexion point has enabled the development of ...
1) multiple security levels 保密性可分级 2) scalability[,skeilə'biliti] 可分级性 例句>> 3) Blastability classification 可爆性分级 例句>> 4) classification of drilling possibility 可钻性分级 5) security level 保密等级 6) Distinguishability of Ciphertexts ...
or a cybersecurity incident. These include Chinese citizens, individuals and other organizations, social interest and public order, or national security. Impacted level refers to whether network disruptions or a cybersecurity incident will cause minor, major, or critical levels of impact on the ...
The WebSphere Security Domains (WSD) provide the flexibility to use different security configurations in WebSphere Application Server. The WSD is also referred to as multiple security domains, or simply, security domains. You can configure different secu
Security mechanisms are implemented for each automotive function individually. This individual security design leads to several problems: combining several functions that are for its own secure may not result in a secure system. Furthermore, the combination of functions might also lead to situations, ...
A security system is provided with multiple levels of access in which a higher level pass code gives the user access to numerous system functions, such as disarming of the system, resetting, system testing, loop by-passing, and system programming, whereas a lower level pass code gives the use...