Computer Science ›› 2007, Vol. 34 ›› Issue (6): 149-151.

Previous Articles     Next Articles

ZUO Yong-Li ,WU Zhong-Fu ,WU Kai-Gui, DENG Wei (Computer College, Chongqing University, Chongqing 400044)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: For intrusion-tolerant database systems, it's crucial for them to dynamically change their behavior and continue delivering essential services under malicious attacks. Thus, combined with role-based access control, we propose an adaptive architecture to i

Key words: Intrusion-tolerant, Access control, Role, Neural networks

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!