说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 入侵容忍数据库
1)  Intrusion tolerance database
入侵容忍数据库
1.
Intrusion tolerance database technologies aim for improving the survivability of the database systems faced with malicious intrusions, so as to enable the database systems to provide continuous data service even during the time of being intruded.
入侵容忍数据库技术旨在提高数据库系统面临恶意入侵时的可生存能力,使其即使在被入侵的情况下仍能继续为用户提供数据服务。
2)  intrusion tolerant database system
入侵容忍的数据库系统
1.
This paper presents the design of a kind of intrusion tolerant database system,the purpose of which is to guarantee the completeness and reliability of the data in the case of that the database is attacked.
提出了一种弹性入侵容忍的数据库系统,其目的是在数据库受到攻击时,保证数据的完整性、可靠性。
3)  intrusion tolerance
入侵容忍
1.
Design of voting algorithms and synchronous scheme of intrusion tolerance database;
入侵容忍数据库的选举算法和同步方案设计
2.
Solution of security database based on multi-layer intrusion tolerance;
基于多级入侵容忍的数据库安全解决方案
3.
Digital Signature Based on Elliptic Curve Cryptography and Its Application in Intrusion Tolerance CA;
基于ECC的数字签名及其在入侵容忍CA中的研究
4)  intrusion tolerance
容忍入侵
1.
Secure intrusion tolerance scheme based on proactive secret sharing;
基于主动秘密共享的安全容忍入侵方案
2.
Research of intrusion tolerance middleware model based on interceptor;
基于拦截器的容忍入侵中间件模型研究
3.
Design of intrusion tolerance application server based on voting algorithm;
基于大数表决机制的容忍入侵应用服务器设计
5)  intrusion tolerant
入侵容忍
1.
An intrusion tolerant KDC scheme for multicast communication;
一种入侵容忍的广播通讯KDC方案
2.
Research of Realization Approach for Intrusion Tolerant System Based on Combined Strategy;
基于组合策略的入侵容忍系统实现方法研究
3.
In this paper an intrusion tolerant CA system was presented.
提出了一个入侵容忍CA(Certificate Authority,认证中心)系统,在此系统中构造了一个基于椭圆曲线密码体制的(t,n)门限签密方案,该方案是数字签名和公钥加密的有机集成,不仅减少了系统的开销,并使得系统能探测故障服务器和克服签密合成者的欺骗。
6)  intrusion-tolerant
入侵容忍
1.
Authentication System with Intrusion-tolerant Feature;
具有入侵容忍特性的身份认证系统
2.
Threshold Password-enabled Based on Distribute Intrusion-Tolerant Protect Private Key;
基于门限加密技术的全分布入侵容忍私钥保护
3.
The Research and Implementation on Threshold Password-Enabled Based of Intrusion-Tolerant Protect Private Key;
基于门限加密技术的入侵容忍私钥保护应用研究
补充资料:入侵
1.侵入国境。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条