proxy database 中文意思是什麼

proxy database 解釋
代理數據庫
  • proxy : n. 1. 代理(權);代表(權);代理投票。2. 代理人,代表人;代用品。3. (對代理人的)委託書。
  1. You can connect your report to almost any database source, as well as to proxy data, such as a result set for example, an ado. net

    可以將報告連接到幾乎所有的數據庫源以及代理數據,例如結果集(如一個ado . net
  2. Then you can connect your report to almost any database source, as well as to proxy data, such as a result set for example, an ado. net dataset

    然後,可以將報表連接到幾乎所有數據源以及代理數據,例如結果集(例如,一個ado . net dataset ) 。
  3. The text commenced from the technique background of the firewall, which introduced the ixa architecture of the network processor first, including the total architecture characteristics, internal technique, hardware etc. ; then described the whole hardware structure and the software structure of the firewall, and development environment ; after that introduced the conception of network security and firewall technique, and gave analysis of characteristics of ipv6 protocol in detail ; with the firewall design immediately after at every step thorough, put forward the requirement of the ipv6 firewall project first, including design target, technique innovation, application situation etc., described software and hardware architecture of the whole system, the internal connection and total flow later on, elaborated function and realization of six modules of control plane, including vpn, packet filter core, application proxy, configuration and management, url filter, log, and referred to the database that the

    正文開始從防火墻的技術背景入手,先介紹了網路處理器的ixa架構,包括總體的架構特點、內部技術、具體型號硬體等;接著描述了防火墻的整個硬體結構和軟體結構,以及開發環境;然後介紹了網路安全的概念和防火墻技術,並對ipv6協議特點作了較為詳細的分析;接著按著防火墻設計的步步深入,先提出了ipv6防火墻的需求,包括設計目標、技術創新點、應用場合等,隨后描述了系統整體的軟硬體結構、內部聯系及總體流程,而後著重詳細闡述上層vpn 、包過濾核心、應用代理、配置管理、 url過濾、日誌六個控制平面子模塊的功能和實現,並提及系統實現中使用的數據庫。
  4. Data minding as we call, which refers to extracting interested knowledge from large database or data warehouse. the network accounting system of the paper compare the traditional methods, the design and realization of network accounting system is based on proxy

    在介紹了入侵檢測系統之後,本論文在比較了傳統的計費方法的基礎上,提出和實現了一種適合本園區網特點的基於代理服務器的計費管理系統。
  5. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準令牌交換協議相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
分享友人