• 入侵容忍理论入手,论述了一种入侵容忍数据库系统设计方案系统进行选举的实现过程。

    It begins with the theory of intrusion tolerant, discusses a design of the database using the theory and the realizing of ballot in such a system.

    youdao

  • 文章介绍入侵容忍数据库系统选举方案设计与实现。

    This paper introduces the design of balloting in intrusion tolerant database system.

    youdao

  • 同时验证模型可行性开发出一个入侵容忍数据库系统原型

    At the same time, an intrusion tolerance database system prototype is developed to verify possibility of the model.

    youdao

  • 模型从入侵容忍机制所关注触发器进行考虑,采用入侵诱骗策略迷惑拖延入侵增强数据库系统安全性能。

    It adopts the trigger of intrusion detective system and intrusion deception mechanism to fool and hold off attackers, enhance the security of database system.

    youdao

  • 本文介绍入侵容忍数据库系统设计系统实现选举过程

    Ihis paper introduces a design of intrusion tolerant database system and the implementation of balloting process in it.

    youdao

  • 本文介绍入侵容忍数据库系统设计系统实现选举过程

    Ihis paper introduces a design of intrusion tolerant database system and the implementation of balloting process in it.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定