入侵容忍技术是继信息保护技术和入侵检测、容错技术之后的第三代网络安全的核心。
Intrusion tolerant technology is the core of the third generation of network security in back of information protection, intrusion detection and fault tolerance technology.
当受保护系统的组件受到攻击时,入侵容忍技术能维持整个系统关键信息和服务的完整性、机密性和可用性。
When the component of the protected system is attacked , intrusion tolerant technology can maintain integrity , confidentiality and usability of the whole system's key information and service .
入侵容忍技术认同安全问题的不可避免性,针对安全问题,不再将消除或者防堵作为第一重点,而把目光投射到如何在攻击之下系统仍能保证不间断地正常运行这一点。
The tolerance technology admits that security problem is unavoidable, and it focuses on how system can organically assure and survive under attacks but not how to prevent or eliminate the attacks.
到目前为止,学术界对于基于门限密码学的入侵容忍研究几乎都集中在门限rsa密码技术的应用上。
Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.
测试表明,本文设计的门限加密入侵容忍私钥保护技术的安全弹性好于目前所使用的私钥认证保护技术。
The result of test indicate that the safety resilience of scheme on our paper is better than others private key prevent technique by now.
对入侵容忍系统按照不同标准进行分类,对现有的容忍入侵技术进行分类介绍。
Classify existing intrusion tolerant systems with different standards and make an overview of existing intrusion tolerant technologies.
容忍入侵是数据安全领域的核心技术之一,其目标是在系统受到攻击时仍能对外继续提供服务。
IntrusionTolerant is the key technology in data-security nowadays. The aim is that when system is attacked, the system can still provide service.
容忍入侵是数据安全领域的核心技术之一,其目标是在系统受到攻击时仍能对外继续提供服务。
IntrusionTolerant is the key technology in data-security nowadays. The aim is that when system is attacked, the system can still provide service.
应用推荐