抽象的
Study of system security architecture
Jiang He
This paper describes the hybrid nature of a DCEÂ’s communications and processing environment, including a discussion of the system security architecture that is present on each DCE memberÂ’s node. This section illustrates the position of the TMS as a decision-making layer that supports the key management system (KMS) with assessments of trustworthiness.
免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证