入侵容忍数据库的复杂性主要是由破坏扩散所引起的。
The complexity of intrusion tolerance database system is mainly caused by a phenomenon called damage spreading.
文章介绍入侵容忍数据库系统中选举方案的设计与实现。
This paper introduces the design of balloting in intrusion tolerant database system.
同时,为验证模型的可行性,开发出一个入侵容忍数据库系统原型。
At the same time, an intrusion tolerance database system prototype is developed to verify possibility of the model.
本文介绍了入侵容忍数据库系统的设计和在该系统中实现选举的过程。
Ihis paper introduces a design of intrusion tolerant database system and the implementation of balloting process in it.
入侵容忍数据库研究的目标是利用不可信的数据库管理系统构建可信的数据库应用系统。
The aim of intrusion tolerance database is to utilize unauthentic DBMS to structure the believable database application system.
基于冗余的入侵容忍数据库是由多个异构数据库服务器组成的,通过增加冗余单元实现数据库的可生存性和可用性,但是冗余会引起系统性能下降。
The intrusion tolerance database based on redundancy is made of several isomerous database servers. And by adding redundancy cell, it achieves the survival and availability of database.
从入侵容忍的理论入手,论述了一种入侵容忍的数据库系统的设计方案和在该系统中进行选举的实现过程。
It begins with the theory of intrusion tolerant, discusses a design of the database using the theory and the realizing of ballot in such a system.
该模型从入侵容忍机制所关注的触发器进行考虑,采用入侵诱骗策略来迷惑和拖延入侵者,增强了数据库系统的安全性能。
It adopts the trigger of intrusion detective system and intrusion deception mechanism to fool and hold off attackers, enhance the security of database system.
该模型从入侵容忍机制所关注的触发器进行考虑,采用入侵诱骗策略来迷惑和拖延入侵者,增强了数据库系统的安全性能。
It adopts the trigger of intrusion detective system and intrusion deception mechanism to fool and hold off attackers, enhance the security of database system.
应用推荐