容侵
- 网络intrusion-tolerant;intrusion tolerance
-
二方共享与(t,n)门限方案相结合的容侵CA方案
An Intrusion-tolerant CA System Based on Two-party Secret Sharing and ( t , n ) Threshold Scheme Mechanism
-
WSN中具有容侵能力的分簇路由方案
A Clustered Routing Scheme with Intrusion-tolerant for Wireless Sensor Networks
-
基于主动秘密共享的Web容侵策略研究
An Intrusion Tolerance Strategy Based on Proactive Secret Sharing for Web Applications
-
基于容侵技术的Web服务器设计
Design of Web Server Based on Intrusion Tolerant Technique
-
基于信任关系的IP网络容错容侵机制
An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks
-
容忍入侵技术研究及一个容侵CA系统的实现
Research of Intrusion Tolerance Technology and Implementation of an Intrusion Tolerated CA System
-
基于可生存性的adhoc网络容侵策略
Survivability-supported Intrusion-tolerance Policy for Ad Hoc
-
基于状态转换的SIP容侵模型研究
Research on the intrusion tolerance model of SIP based on state transfer
-
基于门限ECC的容侵CA私钥保护方案
An Intrusion Tolerant Protection Scheme of CA Private Key Based on Threshold ECC
-
一种基于门限RSA的容侵系统结构
An Intrusion Tolerant Architecture Based on Threshold RSA
-
初步建立了基于(w,t)秘密共享理论的网络容侵模型。
So a model of network intrusion tolerance based on ( w , t ) threshold scheme has been put forward in this paper .
-
分析了常用安全防护技术的局限性,提出了用容侵技术来构建安全的Web服务器,使得服务器在被入侵的情况下仍能对外提供有效服务。
Firstly analyzes the limitations of often used defensive technologies , and then issues an intrusion tolerant technology to design secure Web server , which can still provide effective services in the case of being attacked .
-
根据提出的平台设计方案,实现了一个自治愈的容忍入侵J2EE应用服务器平台原型,并在该原型中应用了容侵自治愈方法。
According to the proposed platform , we achieved a self-healing intrusion-tolerant J2EE application server platform prototype and applied the self-healing intrusion-tolerant method in the prototype .
-
该方案具体是基于软件自治愈技术和组件技术,以J2EE规范中的拦截器为嵌入点,对J2EE应用服务器进行容侵自治愈功能透明扩展。
The design as follows : as an embedded point to the interceptor in J2EE specification , the self-healing intrusion-tolerant function for the J2EE application server was extended transparently . 2 .
-
n个独立的取证存储区使系统可以在取证存储区的破坏数不超过n-t时仍能完成取证审计,提高了取证信息在取证服务器中的安全性,增强了系统的容错、容侵性能。
The system can continue to support computer forensics unless more than areas in store for forensics information were broken .
-
无Dealer的(t,n)门限RSA算法能够使容侵系统在部分系统遭受攻击的情况下,继续保持系统私钥的安全性和可用性。
The ( t , n ) threshold RSA algorithm enables the system to keep the security and availability of the private key without a trusted dealer when parts of system are already under attack .
-
针对这一问题,本文分析了自我清除入侵容忍方法的思想及工作原理,并且将其应用到集群CAS模型中,提出了具有容侵能力的CAS认证服务器模型。
For solving this issue , we analyze methodology of self-cleansing intrusion tolerance and apply it to cluster CAS model , and we propose a CAS authentication model with intrusion tolerance .
-
文章将分组码的特性应用到SITAR容侵模型的投票机制中去,讨论有效避免在SITAR模型中投票监视器在投票/裁决之前需进行结果的复杂转换的方法。
This paper presents major error-control techniques available for voting for SITAR intrusion tolerant model , and discusses an effective method to avoid complex transformations in the Ballot Monitors .
-
基于容侵技术的电力企业网络安全体系模型
Network security model of power enterprise based on intrusion tolerance technology
-
容侵技术在电力系统数据网络安全中的应用
Application of intrusion tolerance technology in power system data network security
-
一种并行容侵系统研究模型&RC模型
A Parallel Model of Intrusion Tolerance System : RC Model
-
基于诱骗机制的网络容侵模型的设计与实现
Model design of intrusion tolerance based on trapping mechanism and its implementation
-
一种基于马氏链的可容侵网络状态评估模型
A Model of Intrusion Tolerant Network State Evaluation Based on Markov Chain
-
基于角色访问的非冗余数据库容侵结构
Architectures for Intrusion Tolerant Databases Based on Role-Based Accesss Control
-
无线传感器网络中的容侵密钥建立研究
Research on Resilient Key Establishment Protocols in Wireless Sensor Networks
-
基于检错编码方法容侵系统中的投票机制研究
Voting Mechanism of Intrusion Tolerant Architecture Based on Error-detection
-
容侵系统是一种全新的网络安全技术。
Intrusion tolerance system is a new kind of fire network security technique .
-
容侵系统的成员管理协议研究
The Research of Group Membership Protocol in Intrusion-Tolerant System
-
基于再生技术的无线传感器网络容侵拓扑控制方法
Self-Regeneration Based Method for Topology Control with Intrusion Tolerance in Wireless Sensor Networks
-
一种新型容侵系统触发器研究与设计
Research on New Trigger Model for Intrusion Tolerance System