本地虛擬協議 的英文怎麼說

中文拼音 [běndexié]
本地虛擬協議 英文
local virtual protocol
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  • : Ⅰ名詞1 (空虛) void; emptiness 2 (政治思想等方面的道理) guiding principles; theory 3 (二十八...
  • : 動詞1. (設計; 起草) draw up; draft 2. (打算; 想要) intend; plan 3. (模仿) imitate
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  • 本地 : this locality; local; native
  • 虛擬 : 1. (虛構的) invented; fictitious 2. (假設的) suppositional; 虛擬語氣 [語言學] subjunctive mood
  1. According to the platform of guizhou power mpls / vpn ( multiprotocol label switching / virtual private network ) data network, the thesis mainly study how to realize the fusion of various professional service systems, and ensure the requirements of security, stability, extensibility, feasibility and in the coordination with local services in order to ensure the large - scale access of services. mpls improves the technology of the private network construction

    基於目前建設的貴州電力mpls / vpn (多標記交換/專用網)數據網路平臺,論文主要探討如何實現各專業系統網路的融合,保障各業務系統安全性、穩定性、可擴展性、可用性以及與業務的高度同性等方面的要求,最終實現規模性的業務接入。
  2. Therefore in order to accomplish the task of the special remote training network we must adopt correct and secure strategies, safety technologies and products to set up a safety transmission system for information. in this essay, the author discussed in detail the conception and technical characteristics of securityed virtual private network ( svpn ). and on the base of analyzing the risk and the requirements of security to establishing a remote traini ng network, the author also proposed a plan for setting up a safety transmission system of the special remote training network with svpn. in this way, svpn will reduce the safety risk in the remote training network system and form a secure and remote transmission system

    文詳細論述了特殊遠程培訓網的結構、現狀,分析了特殊遠程培訓網的風險和安全需求,確定網路建設的安全目標,進而有針對性分析了安全專網( svpn )技術的概念和技術特點,著重探討了svpn的族和ipsec技術原理和安全保護機制,在此基礎上,提出了用安全vpn技術構建特殊遠程培訓網路安全傳輸系統的實施方案,並給出了系統相關的配置。
  3. Through analyzing the source code of mvia ( modular virtual interface architecture ) implemented by berkeley nersc ( national energy research scientific center ), the primary data structure and some details in designing have discussed and performance of mvia been concluded

    論文較為詳細對用戶工業規范?介面體系結構進行了介紹,重點分析了berkeley的一個實現版mvia ,並對其重要結構和實現方法進行了闡述,然後分析了其性能。
  4. This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public - key encryption, digital signatures, pseudo - random number generation, and basic protocols and their computational complexity requirements

    課程精確介紹近代密碼學,並重點介紹原始公鑰加密的密碼基礎原理、數字簽名、隨機數的產生、基及相關的計算復雜度要求。
  5. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的域內用戶的請求,利用gss ( genericsecurityservice )標準令牌交換相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合的安全策略做出最終決策。
分享友人