The complexity of intrusion tolerance database system is mainly caused by a phenomenon called damage spreading.
入侵容忍数据库的复杂性主要是由破坏扩散所引起的。
At the same time, an intrusion tolerance database system prototype is developed to verify possibility of the model.
同时,为验证模型的可行性,开发出一个入侵容忍数据库系统原型。
The aim of intrusion tolerance database is to utilize unauthentic DBMS to structure the believable database application system.
入侵容忍数据库研究的目标是利用不可信的数据库管理系统构建可信的数据库应用系统。
Several voting algorithms and a synchronous scheme are presented, which could effectively deal with the problem and increase the efficiency of intrusion tolerance database.
给出了多种可行的选举算法和一种动态同步方案,能够很好地解决数据库之间的选举和同步问题。
The intrusion tolerance database based on redundancy is made of several isomerous database servers. And by adding redundancy cell, it achieves the survival and availability of database.
基于冗余的入侵容忍数据库是由多个异构数据库服务器组成的,通过增加冗余单元实现数据库的可生存性和可用性,但是冗余会引起系统性能下降。
The intrusion tolerance database based on redundancy is made of several isomerous database servers. And by adding redundancy cell, it achieves the survival and availability of database.
基于冗余的入侵容忍数据库是由多个异构数据库服务器组成的,通过增加冗余单元实现数据库的可生存性和可用性,但是冗余会引起系统性能下降。
应用推荐