In this article, the security and recovery techniques are introduced, which are implemented on a network data base-IDMS.
本文介绍了在网状型数据库idms上实现的安全技术和恢复数据库的过程。
Can interlink with the other systems through web net and date-base system conveniently, can not only realize data sharing function, but also ensure the independent ability and security of the system.
通过网络和数据库系统能方便地同其他系统互连,既能实现数据共享,又能保证系统的独立性、安全性。
Authentication service is a base of implementation of security mobile AD hoc network, mobile users can exchange data communications securely between each other by certificate service.
认证服务是实现安全移动自组网的基础,移动用户可以通过证书服务进行安全数据通信。
This paper deeply researches on EKE protocol and CAPTCHA on the base of the knowledge of Data Encryption and Information Security.
本文主要在掌握了一定的数据加密与信息安全、身份认证等知识的基础上,对EKE协议和CAPTCHA作了较为深入的研究。
The developing instrument of the back end is Access2000 of Microsoft, the whole data base is related each other, makes the data base have relatively high integrality, Consistency and security.
后端的开发工具是Microsoft Access 2000,整个数据库都是相互关联的,使数据库具有较高的完整性,一致性和安全性。
The former should make the function of application integrated and the usage is easy, the latter required a data-base with powerful consistency and integrality, and nice security.
对于前者要求建立起数据一致性和完整性强、数据安全性好的库。而对于后者则要求应用程序功能完备,易使用等特点。
The former should make the function of application integrated and the usage is easy, the latter required a data-base with powerful consistency and integrality, and nice security.
对于前者要求建立起数据一致性和完整性强、数据安全性好的库。而对于后者则要求应用程序功能完备,易使用等特点。
应用推荐