隱性侵入 的英文怎麼說

中文拼音 [yǐnxìngqīn]
隱性侵入 英文
covert intrusion
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • 隱性 : 1 [語言學] covert gender2 [遺傳學] recessivity; recessiveness隱性詞 opaque word; 隱性基因 recessi...
  1. Furthermore, since computers have entered into all fields of people ' s life through network, when people use their computers consciously ( thinking of person ' s privacy as other working information and inputting them, such as home address, telephone numbers for shopping through network ), or unconsciously ( when using computers normally, people are not aware that he is putting his personal records into his computer, such as personal letters, diaries, etc. ), they expose their privacy to the network, providing the possibility for invaders to infringe upon their rights

    而且,由於計算機在網路社會已經浸透到人們生活的各個領域,人們出於種種目的,將私自覺地(作為其他功能信息的一部分寫計算機,如網上購物時的家庭地址、電話等)或不自覺地(人們在正常利用計算機時,並未意識到自己將有私的記錄留在計算機里,如個人信件、日記等)暴露在網上,為擅自闖者留下了權的可能。
  2. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈的便於實現的的訪問區域表示法,並將rbac模型引進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁這一特徵,提出了一種基於區域訪問密度的檢測模型( ids ) ,以對藏在正常訪問中的潛在安全威脅進行報警和日誌。
分享友人