说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 入侵容忍的数据库系统
1)  intrusion tolerant database system
入侵容忍的数据库系统
1.
This paper presents the design of a kind of intrusion tolerant database system,the purpose of which is to guarantee the completeness and reliability of the data in the case of that the database is attacked.
提出了一种弹性入侵容忍的数据库系统,其目的是在数据库受到攻击时,保证数据的完整性、可靠性。
2)  Intrusion tolerance database
入侵容忍数据库
1.
Intrusion tolerance database technologies aim for improving the survivability of the database systems faced with malicious intrusions, so as to enable the database systems to provide continuous data service even during the time of being intruded.
入侵容忍数据库技术旨在提高数据库系统面临恶意入侵时的可生存能力,使其即使在被入侵的情况下仍能继续为用户提供数据服务。
3)  intrusion tolerance system
入侵容忍系统
1.
We propose an architecture of intrusion tolerance system,which combines intrusion detection with fault-tolerance and component-redundancy with diversity,and design a series of triggers to provide persistent and reliable service.
提出一种将入侵检测和容错方法相结合,将冗余和多样性相结合的入侵容忍系统,并且设计了相应的触发器。
2.
Intrusion tolerance system (ITS) is a new approach of computer security which has slowly emerged during the past decade, and obtained more attention in recent years.
入侵容忍系统(ITS)是一个新的计算机安全方法,在过去几年中逐渐显现出来,近期引起了许多学者的关注。
4)  intrusion tolerance
入侵容忍
1.
Design of voting algorithms and synchronous scheme of intrusion tolerance database;
入侵容忍数据库的选举算法和同步方案设计
2.
Solution of security database based on multi-layer intrusion tolerance;
基于多级入侵容忍的数据库安全解决方案
3.
Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;
基于ECC的数字签名及其在入侵容忍CA中的研究
5)  intrusion tolerance
容忍入侵
1.
Secure intrusion tolerance scheme based on proactive secret sharing;
基于主动秘密共享的安全容忍入侵方案
2.
Research of intrusion tolerance middleware model based on interceptor;
基于拦截器的容忍入侵中间件模型研究
3.
Design of intrusion tolerance application server based on voting algorithm;
基于大数表决机制的容忍入侵应用服务器设计
6)  intrusion tolerant
入侵容忍
1.
An intrusion tolerant KDC scheme for multicast communication;
一种入侵容忍的广播通讯KDC方案
2.
Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;
基于组合策略的入侵容忍系统实现方法研究
3.
In this paper an intrusion tolerant CA system was presented.
提出了一个入侵容忍CA(Certificate Authority,认证中心)系统,在此系统中构造了一个基于椭圆曲线密码体制的(t,n)门限签密方案,该方案是数字签名和公钥加密的有机集成,不仅减少了系统的开销,并使得系统能探测故障服务器和克服签密合成者的欺骗。
补充资料:地图数据库管理系统

地图数据库管理系统 map database management system

建立、维护和使用地图数据库的一组软件。

说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条