容侵

  • 网络intrusion-tolerant;intrusion tolerance
容侵容侵
  1. 二方共享与(t,n)门限方案相结合的容侵CA方案

    An Intrusion-tolerant CA System Based on Two-party Secret Sharing and ( t , n ) Threshold Scheme Mechanism

  2. WSN中具有容侵能力的分簇路由方案

    A Clustered Routing Scheme with Intrusion-tolerant for Wireless Sensor Networks

  3. 基于主动秘密共享的Web容侵策略研究

    An Intrusion Tolerance Strategy Based on Proactive Secret Sharing for Web Applications

  4. 基于容侵技术的Web服务器设计

    Design of Web Server Based on Intrusion Tolerant Technique

  5. 基于信任关系的IP网络容错容侵机制

    An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks

  6. 容忍入侵技术研究及一个容侵CA系统的实现

    Research of Intrusion Tolerance Technology and Implementation of an Intrusion Tolerated CA System

  7. 基于可生存性的adhoc网络容侵策略

    Survivability-supported Intrusion-tolerance Policy for Ad Hoc

  8. 基于状态转换的SIP容侵模型研究

    Research on the intrusion tolerance model of SIP based on state transfer

  9. 基于门限ECC的容侵CA私钥保护方案

    An Intrusion Tolerant Protection Scheme of CA Private Key Based on Threshold ECC

  10. 一种基于门限RSA的容侵系统结构

    An Intrusion Tolerant Architecture Based on Threshold RSA

  11. 初步建立了基于(w,t)秘密共享理论的网络容侵模型。

    So a model of network intrusion tolerance based on ( w , t ) threshold scheme has been put forward in this paper .

  12. 分析了常用安全防护技术的局限性,提出了用容侵技术来构建安全的Web服务器,使得服务器在被入侵的情况下仍能对外提供有效服务。

    Firstly analyzes the limitations of often used defensive technologies , and then issues an intrusion tolerant technology to design secure Web server , which can still provide effective services in the case of being attacked .

  13. 根据提出的平台设计方案,实现了一个自治愈的容忍入侵J2EE应用服务器平台原型,并在该原型中应用了容侵自治愈方法。

    According to the proposed platform , we achieved a self-healing intrusion-tolerant J2EE application server platform prototype and applied the self-healing intrusion-tolerant method in the prototype .

  14. 该方案具体是基于软件自治愈技术和组件技术,以J2EE规范中的拦截器为嵌入点,对J2EE应用服务器进行容侵自治愈功能透明扩展。

    The design as follows : as an embedded point to the interceptor in J2EE specification , the self-healing intrusion-tolerant function for the J2EE application server was extended transparently . 2 .

  15. n个独立的取证存储区使系统可以在取证存储区的破坏数不超过n-t时仍能完成取证审计,提高了取证信息在取证服务器中的安全性,增强了系统的容错、容侵性能。

    The system can continue to support computer forensics unless more than areas in store for forensics information were broken .

  16. 无Dealer的(t,n)门限RSA算法能够使容侵系统在部分系统遭受攻击的情况下,继续保持系统私钥的安全性和可用性。

    The ( t , n ) threshold RSA algorithm enables the system to keep the security and availability of the private key without a trusted dealer when parts of system are already under attack .

  17. 针对这一问题,本文分析了自我清除入侵容忍方法的思想及工作原理,并且将其应用到集群CAS模型中,提出了具有容侵能力的CAS认证服务器模型。

    For solving this issue , we analyze methodology of self-cleansing intrusion tolerance and apply it to cluster CAS model , and we propose a CAS authentication model with intrusion tolerance .

  18. 文章将分组码的特性应用到SITAR容侵模型的投票机制中去,讨论有效避免在SITAR模型中投票监视器在投票/裁决之前需进行结果的复杂转换的方法。

    This paper presents major error-control techniques available for voting for SITAR intrusion tolerant model , and discusses an effective method to avoid complex transformations in the Ballot Monitors .

  19. 基于容侵技术的电力企业网络安全体系模型

    Network security model of power enterprise based on intrusion tolerance technology

  20. 容侵技术在电力系统数据网络安全中的应用

    Application of intrusion tolerance technology in power system data network security

  21. 一种并行容侵系统研究模型&RC模型

    A Parallel Model of Intrusion Tolerance System : RC Model

  22. 基于诱骗机制的网络容侵模型的设计与实现

    Model design of intrusion tolerance based on trapping mechanism and its implementation

  23. 一种基于马氏链的可容侵网络状态评估模型

    A Model of Intrusion Tolerant Network State Evaluation Based on Markov Chain

  24. 基于角色访问的非冗余数据库容侵结构

    Architectures for Intrusion Tolerant Databases Based on Role-Based Accesss Control

  25. 无线传感器网络中的容侵密钥建立研究

    Research on Resilient Key Establishment Protocols in Wireless Sensor Networks

  26. 基于检错编码方法容侵系统中的投票机制研究

    Voting Mechanism of Intrusion Tolerant Architecture Based on Error-detection

  27. 容侵系统是一种全新的网络安全技术。

    Intrusion tolerance system is a new kind of fire network security technique .

  28. 容侵系统的成员管理协议研究

    The Research of Group Membership Protocol in Intrusion-Tolerant System

  29. 基于再生技术的无线传感器网络容侵拓扑控制方法

    Self-Regeneration Based Method for Topology Control with Intrusion Tolerance in Wireless Sensor Networks

  30. 一种新型容侵系统触发器研究与设计

    Research on New Trigger Model for Intrusion Tolerance System