Abstrait
Study of system security architecture
Jiang He
This paper describes the hybrid nature of a DCEÂ’s communications and processing environment, including a discussion of the system security architecture that is present on each DCE memberÂ’s node. This section illustrates the position of the TMS as a decision-making layer that supports the key management system (KMS) with assessments of trustworthiness.
Avertissement: testCe résumé a été traduit à l'aide d'outils d'intelligence artificielle et n'a pas encore été examiné ni vérifié