In malicious host surroundings, a software can be reverse engineered and also can be tampered with.
在恶意主机环境下,软件系统可以被逆向工程或被篡改,其机密性、完整性与可用性受到威胁。
How to protect application program from malicious host is a new issue that cannot be dealt by traditional technologies.
如何保护应用程序不受恶意主机的破坏是传统安全技术无法处理的。
This paper proposed a mobile agent static routing protocol based on the reference state which can prevent from malicious host.
本文提出了一种基于参考状态的移动代理防患恶意主机的静态路由协议。
External malicious host can still through the NAT equipment and the public address using private address arrive the slogan "protected" host.
外部的恶意主机仍然可以通过NAT设备的公有地址和端口号到达使用私有地址的“受到保护”的主机。
Among these security problems, how to protect mobile code from malicious host is a new issue that cannot be dealt by traditional technologies.
在这些安全问题中,如何保护移动代码不受主机的损害是传统安全技术无法处理的新需求。
First is the security of mobile agent system, especially the malicious host problem; Second is the fair exchange problem in electronic commerce.
首先是移动代理系统的安全问题,特别是恶意主机问题;其次是电子商务中的公平交易问题。
So protection technologies of mobile code in malicious host attract much attention and there are very important theoretical and practical significance.
因此,恶意主机环境下移动代码保护技术的研究具有重要的理论和现实意义并受到极大的重视。
Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.
在恶意主机环境下,主机可以对软件系统进行逆向工程或者肆意的篡改,其安全性、完整性与可用性都受到了很大的威胁。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
Many Chinese saw the narrow failure of their bid to host the games in 2000 as the result of malicious western attempts to keep their country in check.
许多中国人认为2000年那次申奥功亏一篑是由于心怀不轨的西方人企图让它们自己的国家榜上有名。
The monstrous complexity of contemporary computer systems inevitably results in design and implementation errors, most of which allow malicious users to gain control of the remote host or damage it.
现代计算机系统在设计和实现上的错误是由它自身的高度复杂性引起的,大多数错误将容许恶意用户获得主机的远程控制权或者受到损害。
Code (software) that is transferred from a host to a client (or another host computer) to be executed (run). When we talk about malicious mobile code we may use a Worm as an example.
代码(软件)从一台主机传送到客户机上(或者传送到另一台主机上)被执行(运行)。譬如蠕虫。
Code (software) that is transferred from a host to a client (or another host computer) to be executed (run). When we talk about malicious mobile code we may use a Worm as an example.
代码(软件)从一台主机传送到客户机上(或者传送到另一台主机上)被执行(运行)。譬如蠕虫。
应用推荐