1) safety critical operating system
安全关键操作系统
2) safe_critical system
安全_关键系统
3) safety-critical system
安全关键系统
1.
In order to guarantee the validity of safety-critical system and to prevent the system failure caused by user s improper operation,a general safety architecture and a safety policy model for safety-critical system are proposed.
为保障安全关键系统的正常运行,防止由用户对安全关键设备的误操作引起的系统故障,该文提出了一种通用的安全关键系统防危体系结构和防危策略模型,并以核能发电控制系统为原型研究了一种基于有限自动机的防危策略设计技术,该技术可推广到其他任何安全关键系统设备中。
2.
This paper concerns the design of safety-critical systems.
以矿井水泵的操控系统为实例研究对象,通过对该实例的分析与设计,来阐述如何将离散事件系统(DiscreteEventSystem)的监督控制理论应用于安全关键系统的设计,从而为系统的可靠性设计探索新的方法。
3.
High dependability safeguard techniques for safety-critical systems were proposed.
针对安全关键系统,着重介绍了各种高可信保障技术。
4) secure OS
安全操作系统
1.
Separate secure domain is the basic requirement for secure OS.
安全域隔离是对安全操作系统的基本要求。
2.
In the paper, a two-levels-cache mechanism is brought in the GFAC based on a three levels model of access, and is implemented in Redflag secure OS.
该文在建立访问的三层模型基础上 ,引入二级访问决策结果缓冲器到GFAC中 ,并且在红旗安全操作系统 (RFSOS)中实现 。
3.
Providing complete security attributes revocation function in secure OS is required by both multi policy supporting mechanism and Common Criteria, but all the relevant research on this subject are imperfect.
多安全政策支持机制和新的国际信息安全评价标准—— CC(com mon criteria)标准都要求安全操作系统提供完善的安全属性即时撤消机制 ,但是目前的研究都不够完善 。
5) security operating system
安全操作系统
1.
The object types in the operating system,which were sorted into the static object and the dynamic object,were analyzed,and some deficiencies in accessing the object in the security operating system were pointed out.
首先分析了操作系统中客体的类型,将客体分为静态客体和动态客体,然后总结了安全操作系统中对客体的处理存在的问题。
2.
The mechanism of buffer overflow from the point of view of security operating system is analyzed,buffer overflow with BLP model is formalized.
从安全操作系统的角度分析了堆栈溢出的原理,以BLP模型为工具对堆栈溢出进行了形式化并在此基础上适当调整了该模型,从安全模型的层次上消除了堆栈溢出的隐患。
3.
0/4 being the project background, this paper reports the research of covert channel analysis of security operating system.
本文以图灵四级安全操作系统为项目背景,描述了对安全操作系统隐蔽通道分析的研究。
6) operating system security
操作系统安全
1.
The paper studies that in the teaching of operating system security,centered on Security reference monitor,how to organize the teaching content of trusted Computing Base,security mechanism,security model and secure evaluating organically to help student handle the basic concept and fundamental theory of the design and development of secure operating system systematically.
研究在操作系统安全课程教学中,以引用监控器为中心,把可信计算基、安全机制、安全模型、以及安全评测等看似零散的教学内容有机地组织起来,使学生能够系统地把握安全操作系统的设计和开发所必备的基本概念和基础理论。
2.
So researches on operating system security has always been the hot topic at home and aboard.
操作系统是计算机系统运行的基础,也是构筑网络信息系统的基础,因而操作系统安全一直是国内外研究的重点。
补充资料:分时系统(见操作系统)
分时系统(见操作系统)
time-sharing system
fens卜一x一tong分时系统(time一sharing system)系统口见操作
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条