It begins with the theory of intrusion tolerant, discusses a design of the database using the theory and the realizing of ballot in such a system.
从入侵容忍的理论入手,论述了一种入侵容忍的数据库系统的设计方案和在该系统中进行选举的实现过程。
It begins with the theory of intrusion tolerant, discusses a design of the database using the theory and the realizing of ballot in such a system.
从入侵容忍的理论入手,论述了一种入侵容忍的数据库系统的设计方案和在该系统中进行选举的实现过程。
应用推荐