应用结果表明,该检测方法对非法篡改具有高度敏感性和优秀的数据篡改检测性能。
Applied results demonstrate that this method has highly sensitive to intentional tampering and outstanding detection performance for data tamper detection.
数据篡改——利用访问控制机制中允许攻击者对Web服务进行未经授权调用的弱点来更改数据。
Data tampering — Exploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.
如果有可能篡改认证设备,则获取这样的数据并不会很困难。
If it's possible to tamper with the authentication device, such data capture should not be all that difficult.
如果攻击者可以篡改认证硬件,则可能将伪造的数字数据直接发射到设备中。
If an attacker can tamper with the authentication hardware, it might be possible to inject falsified digital data directly into the device.
这个模型将篡改授权数据的风险降至了最低,因此服务器不用花费大量的时间来验证数据了。
The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.
这种方式使用户能够创建他们需要的数据库对象,同时避免他们篡改其他用户创建的数据库对象,或者将自己和其他人创建的对象混在一起。
This approach allows users to create whatever database objects they need and prevents them from tampering or getting their database objects mixed up with those created by other users.
气候变化怀疑论者宣称,这些电子邮件显示科学家们篡改和隐瞒了数据,以支持人为造成气候变化的理论。
Climate change sceptics claimed they showed scientists manipulating and suppressing data to back up a theory of man-made climate change.
因此,当真正发生错误时,就表示您可能得到一个不完整的文档或解析文档中的数据可能丢失、篡改或错误。
So what you really get with an error is indication that you might get an incomplete document or that some data in that parsed document might be lost, garbled, or inaccurate.
在网络上传输的数据容易受到各种网络攻击,例如嗅探网络传输、不可抵赖性、篡改数据、欺骗、拦截和捕捉回复。
The data transmitted over the network is susceptible to network attacks like snooping the network traffic, non-repudiation, tampering the data, spoofing, hijacking, and capture-replay.
WS - Security使用XMLSignature确保数据不会在传输中被篡改,因为任何窜改都会导致签名失效。
WS-Security USES XML signature to ensure that data has not been tampered with in transit, because any tampering would invalidate the signature.
数据完整性——为了防止参数篡改,HDIV保证任何服务器产生的、只读数据(如隐藏域)不能被客户端修改。
Data Integrity - HDIV guarantees that any server-generated, read-only data (e.g. hidden fields) are not edited on the client to avoid parameter tampering attacks.
传输安全确保了没有人可以篡改服务端发到客户端或者从客户端接收的数据。
Transport security ensures that no one can tamper with the data being sent to a client or data received from a client.
所有这些信息都需要按照可靠且不可篡改的方式存储起来,支持根据这些数据生成审计报告。
All this information needs to be stored in a secure and tamper-resistant manner with the capability to report on it for audit purposes.
有关此案的消息传来之际,正值有人声称,投资银行利用衍生品帮助希腊篡改其国债数据,以使该国符合欧元货币体系对成员资格的要求。
The case comes amid claims that investment Banks helped Greece to fudge its national debt figures through the use of derivatives in order to qualify for membership of the euro.
如果一个文件完全丢失了,数据已经篡改而无法修复,或在XML文档中缺少必需元素,这时可以中断用户的工作。
If a file is completely missing, data is garbled beyond recovery, or an essential element is absent in an XML document, that is when you interrupt your user's work.
处理您的个人数据过程中,龙沙集团采取合理的措施来避免信息丢失、误用、未经授权访问、披露、篡改或毁坏。
In the course of handling your Personal Data, Lonza Group takes measures reasonably designed to protect that information from loss, misuse, unauthorized access, disclosure, alteration or destruction.
描述信息技术保全政策和程序,对密码保护和识别滥用不当访问,篡改或改变业务数据的程序。
Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.
文件加密存储是保证机密数据不被窃取或篡改的有效方法。
The file cryptographic storage is an effective method to guarantee secret data from being stolen or tampered.
不幸的是,这些泵输出的数据可以被篡改作假。
Unfortunately, those pumps can be tampered with to give false readings.
日本第六大小轿车制造商三菱汽车承认,其雇员已在某些车型的燃油消耗测试中篡改数据,使之能虚报里程数。
Mitsubishi Motors, Japan's sixth-largest carmaker, admitted that its employees had altered data in fuel-consumption tests for some of its models so that they would record better mileage.
恶意篡改文件的类型属性以掩盖文件真实结构达到诱骗用户访问、回避检测、隐藏数据等目的是计算机犯罪行为中最常用的手段。
Malicious tampering with the type of document to conceal identity documents so as to entice users to visit real structure, avoiding detection and hiding data is the most common computer crime means.
可能是完整性口令不正确,或在指定文件中的数据已被篡改或毁坏。
Either the integrity password is incorrect or the data in the file specified has been tampered with or corrupted in some manner.
官方的数据都是经过篡改的,据私营机构估计已经稍微超过20%。
Official statistics are doctored, and private estimates are a little over 20%.
其批评者称:篡改后的评估数据意味着希腊为了获得救助资金将被迫接受他的国际伙伴国要求的采取更为严苛的财政紧缩政策。
The revised estimates, say his detractors, meant that Greece was forced by its international partners to take ever-harsher austerity measures to receive bail-out funding.
其批评者称:篡改后的评估数据意味着希腊为了获得救助资金将被迫接受他的国际伙伴国要求的采取更为严苛的财政紧缩政策。
The revised estimates, say his detractors, meant that Greece was forced by its international partners to take ever-harsher austerity measures to receive bail-out funding.
应用推荐