2434人阅读
访问控制access control
access control list
accountability
主动威胁active threat
audit trail
authentication
authentication information
authentication exchange
authorization
availability
capability
ciphertext
confidentiality
credentials
cryptanalysis
cryptographic checkvalue
cryptography
data integrity
data origin authentication
decipherment
decryption
denial of service
digital signature
encipherment
encryption
end-to-end encipherment
identity-based security policy
key management
link-by-link encipherment
manipulation detection
notarization
passive threat
peer-entity authentication
physical security
repudiation
路由选择控制routing control
rule-based security policy
security audit
security audit trail
security label
security policy
security service
selective field protection
sensitivity
traffic analysis
traffic flow confidentiality
traffic padding
trusted functionality
参考知识库
* 以上用户言论只代表其个人观点,不代表CSDN网站的观点或立场
访问:9911次
排名:千里之外}