PROXY SQUID

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security considerations with Squid proxy server

Securing and controlling workstation access to the web has never been an easy task for security professionals. Firewalls and access control list on routers alone may not bring an acceptable level of security for your organization. Even if their primary role is to reduce network traffic and improve performance, HTTP proxy servers (also called cache servers) are likely to be installed as an addit...

متن کامل

Squid Proxy Server Cache Management using K-means Algorithm

: All services needs to have an accuracy, availability and speed. Internet users are increasing very rapidly which indicates a challenge in maintaining the accuracy, availability and speed in the Internet services. To reduce the load on Internet and improve the Quality of Service (QoS) the web caching technique are in use and all proxy server are maintaining their own cache to provide the reque...

متن کامل

Squid retinochrome

Retinochrome is a photosensitive pigment located primarily in the inner portions of the visual cells of cephalopods. Its absorption spectrum resembles that of rhodopsin, but its chromophore is all-trans retinal, which light isomerizes to 11-cis, the reverse of the situation in rhodopsin. The 11-cis photoproduct of retinochrome slowly reverts to retinochrome in the dark. The chromophoric site of...

متن کامل

Proxy Signatures Secure Against Proxy Key Exposure

We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential agg...

متن کامل

Proxy PNNI Augmented Routing (Proxy PAR)

ATM networks often carry other popular communication protocols such as TCP/IP. LAN emulation techniques, with LANE and MPOA being the most prominent ones, make it possible to support existing applications, but do not take advantage of many ATM capabilities. Furthermore, such server-based solutions often suffer from single point of failure problems. PNNI Augmented Routing (PAR), based on Private...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Interação - Revista de Ensino, Pesquisa e Extensão

سال: 2019

ISSN: 2446-9874,1517-848X

DOI: 10.33836/interacao.v17i17.79