Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 497 )

2018 ( 15970 )

2017 ( 16563 )

2016 ( 18919 )

Custom range...

Search Results: 1 - 10 of 281144 matches for " Database<br>容侵 "
All listed articles are free for downloading (OA Articles)
Page 1 /281144
Display every page Item
Architectures for Intrusion Tolerant Databases Based on Role-Based Accesss Control

DENG Wei,WU Zhong-Fu,YE Chun-Xiao,ZHONG Jiang,

计算机科学 , 2006,
Abstract: 在数据库受到攻击的情况下,保证关键业务的持续服务和动态恢复入侵造成的破坏是非常重要的问题。当前很多中小型网络数据库并无冗余机作为后备,但又必须采用客侵机制采保证其可用性和安全性,所以本文提出了一个基于角色访问的非冗余容侵数据库结构。谊结构能通过隔离执行关键数据采提供不问断的关键业务服务;对于入侵能够在线进行自动恢复;根据用户的角色、历史记录和容侵要求,自动进行状态迁移和系统参数调节等。
An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks

Ji Jun-jie,Yang Xiao-long,Wang Jin,Wu Xiong-biao,Lin Jian-ren,Long Ke-ping,

电子与信息学报 , 2009,
Abstract: Nowadays, IP networks are suffering many faults and malicious attacks which greatly threaten its security and survivability. So it is an important issue that how to make the IP networks to be more robust under faults and attacks, i.e., to improve their tolerance abilities for both fault and intrusion. However recently, most of the researches focus on only one of them, and decouple the survivability and security each other. According to the trust model in social networks, this paper proposes an efficient fault-tolerant and intrusion-tolerant scheme based on trust relationship for IP networks. This scheme not only borrows the trust rating from the social links, but also qualitatively describes the relationships between the trust rating and the network behavior. Then, this paper analyses the scheme how to tolerate three known malicious behaviors, viz., self-faults, bad mouth attacks and conflict behavior attacks. Finally, the numeric simulation results show that the scheme can detect the malicious nodes fast and accurately and efficiently prevent these malicious behaviors in IP networks.
Design of Web Server Based on Intrusion Tolerant Technique

WANG Ning-bo,WANG Xian-pei,

计算机应用研究 , 2005,
Abstract: Firstly analyzes the limitations of often used defensive technologies,and then issues an intrusion tolerant technology to design secure Web server, which can still provide effective services in the case of being attacked.
Model construction and quantitative analysis of autonomic intrusion tolerance system

LI Bing-yang,WANG Hui-qiang,FENG Guang-sheng,

计算机应用研究 , 2009,
Abstract: Aiming at the absence of self-adaptation ability and quantitative analysis on existent intrusion tolerance system,this paper proposed an adaptive hierarchy intrusion tolerance system based on autonomic computing (AHITAC).Adopting hierarchy modes, the critical modules of AHITAC included confidence evaluation of accessing, active trapping on suspicious information, hierarchy study of applications and classed recovery of system function. By implementing the study and adaptive function of confidence threshold, service classification and trap repository, AHITAC implemented the tolerance on intrusion and suspicious information, improving the ability of self recovery and self optimization on object network. The simulation results show that the object network with AHITAC is stable and tolerant.
An Adaptive Architecture for Intrusion-tolerant Databases on Role-based Access Control

ZUO Yong-Li,WU Zhong-Fu,WU Kai-Gui,DENG Wei,

计算机科学 , 2007,
Abstract: 在数据库受到攻击的情况下,能够继续提供服务并根据攻击造成的不同损害进行自适应调整是非常重要的问题,所以本文首次提出基于角色访问的自适应容侵数据库结构。该结构根据用户的角色、入侵的历史纪录、系统状态等因素动态采取不同的容侵策略,因此在保证系统持续提供服务的同时,提高数据库的容侵能力。
Survey of Secure Group Communication Based on Secret Sharing Theory

WANG Xiao kang,YANG Ming,

计算机应用研究 , 2006,
Abstract: Secret sharing is one of the new subjects of cryptography. As the theory of secret sharing developed, it is used in secure group communication more and more regularly. It enhanced the security,robust,integrity and the efficiency of communication. In this article, the theory of secret sharing is first showed, then its applications in threshold schemes,group communication,key escrow,digital authentication and intrusion tolerance system are introduced. At last, the direction of future research is proposed.
Design on Attack-tolerant Scheme in Secure Implementation of Cryptosystems

WANG Yu-zhu,LIAO Xiao-feng,

计算机科学 , 2008,
Abstract: Secure implementation of cryptosystems has become a new research direction.This paper deals with its motivation,task and goal and then,based on the fail-stop protocol,presents a methold of designing attack-tolerant scheme that active attacks cannot cause the release of secrets within the run of system.
邓伟 吴中福 叶春晓 钟将?
计算机科学 , 2006,
Abstract: 在数据库受到攻击的情况下,保证关键业务的持续服务和动态恢复入侵造成的破坏是非常重要的问题。当前很多中小型网络数据库并无冗余机作为后备,但又必须采用客侵机制采保证其可用性和安全性,所以本文提出了一个基于角色访问的非冗余容侵数据库结构。谊结构能通过隔离执行关键数据采提供不问断的关键业务服务;对于入侵能够在线进行自动恢复;根据用户的角色、历史记录和容侵要求,自动进行状态迁移和系统参数调节等。
Real-time Duplicate Software in DB2 Large Database
DB2 大型数据库容灾备份实时复制系统

QU Zhi-Yi,WANG Tao,LI Jian-Xu,

计算机系统应用 , 2012,
Abstract: This paper presents the process for research and implementation a real-time duplicate software in DB2 database. This software used the modular design, and has 5 major modules: Client, Server, Full synchronizing, Increase synchronizing, Load. While the software running, the 5 modules coherent on with another. The client call the server, and the server schedules all task. In the process of the implementation, we grap the database's log real-time to gain the change. This software doesn't use any DB2 database's backup interface, so it well done in the function and efficiency. The test environment is OS:LINUX, CPU:Core 2.4 GHz ,Memory: 2 GB. Under such a test environ-ment, this software worked well.
Self-healing Intrusion Tolerant Method Based on J2EE Application Server

ZHOU Rui-peng,GUO Yuan-bo,LIU Wei,HAN Lei-lei,

计算机科学 , 2011,
Abstract: Aiming at the limitation for intrusion-tolerant and self-healing, this paper presented a self-healing intrusion-tolerant model based on J2EE application server, and presented an self-healing intrusion-tolerant method for this model. Compared with the traditional method, this method not only solved the limitation for intrusion-tolerant, for example,the hidden intrusion, software aging, and the vulnerable prerequisite of intrusion tolerance, but also solved the problem of intrusion in the self-healing. Finally, comparison tests of the self-healing intrusion tolerance clusters,JANTM clusters and J13oss4. 0 clusters verify the self-healing intrusion tolerance method to make self-healing intrusion tolerance clusters higher reliability and survivability.
Page 1 /281144
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.