抽象的

Study of system security architecture

Jiang He


This paper describes the hybrid nature of a DCEÂ’s communications and processing environment, including a discussion of the system security architecture that is present on each DCE memberÂ’s node. This section illustrates the position of the TMS as a decision-making layer that supports the key management system (KMS) with assessments of trustworthiness.


免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证

索引于

  • 中国社会科学院
  • 谷歌学术
  • 打开 J 门
  • 中国知网(CNKI)
  • 引用因子
  • 宇宙IF
  • 电子期刊图书馆
  • 研究期刊索引目录 (DRJI)
  • 秘密搜索引擎实验室
  • ICMJE

查看更多

期刊国际标准号

期刊 h 指数

Flyer