38 references, last updated Thu Apr 19 12:19:45 2001
- [1]
- R. M. Alguliev.
Method of selecting the optimal structure of a distributed authentication
system in virtual private networks.
Automatic-Control-and-Computer-Sciences, 33(3):12-21, 1999.
- [2]
- William A. Arbaugh, James R.
Davin, David J. Farber, and Jonathan M. Smith.
Security for
virtual private intranets.
Computer, 31(9):48-54, September 1998.
- [3]
- Seung-Jin Baek, Moon-Sang
Jeong, Jong-Tae Park, and Tai-Myoung Chung.
Policy-based
hybrid management architecture for IP-based VPN.
In IEEE Symposium Record on Network Operations and Management,
pages 987-988. IEEE, Piscataway, NJ, USA, April 2000.
- [4]
- Tina Bird.
Building VPNs: The 10-point plan.
Data Communications, 27(9):123, 124, 126, 128, 130, 132, June
1998.
- [5]
- Nora Boukari and Ali
Aljane.
Security and
auditing of VPN.
In Proceedings of the International Workshop on Services in Distributed
and Networked Environments, pages 132-138. IEEE, 1996.
- [6]
- C. A. Bower and S. J.
Lodico.
Security and access: new technologies in wide area networks.
In 15th Annual Computers in Libraries 2000. Proceedings - 2000,
pages 25-30. Inf. Today, Medford, NJ, USA, 2000.
- [7]
- William Cheung.
Building multiservice internet protocol virtual private networks.
Proceedings of SPIE - The International Society for Optical
Engineering, 3845:340-349, September 1999.
- [8]
- Tse-Huong Choo.
Vaulted
VPN: Compartmented virtual private networks on trusted operating
systems.
Technical report, HP Lab Bristol, Bristol, UK, March 1999.
- [9]
- Mooi Choo Chuah
and Enrique J. Hernandez-Valencia.
Mobile virtual private dial-up services.
Bell-Labs-Technical-Journal, 4(3):51-72, July 1999.
- [10]
- Andrew Cray.
Secure VPNs: Lock the data, unlock the savings.
Data Communications, 26(7):49-56, May 1997.
- [11]
- Andrew Cray.
Armed compounds.
Data Communications, 27(6):57-62, 64, April 1998.
- [12]
- Chris I. Dalton and D. A.
Clarke.
Secure
partitioned access to local network resources over the internet.
Technical report, HP Lab Bristol, Bristol, UK, December 1998.
- [13]
- J. Davila, J. Lopez, and
R. Peralta.
Implementation of virtual
private networks at the transport layer.
In Information Security. Second International Workshop, ISW'99.,
volume 1729, pages 85-102. Springer-Verlag, Berlin, Germany, 1999.
- [14]
- L. Delgrossi and
D. Ferrari.
The design of
supranet security mechanisms.
In 7th IEEE Intelligent Network Workshop Proceedings, pages
167-173. IEEE, 1998.
- [15]
- J.S. Denker, S.M. Bellovin,
H. Daniel, N.L. Mintz, T. Killian, and M.A. Plotnick.
Moat: a virtual
private network appliance and services platform.
In 13th Systems Adminstration Conference (LISA '99)., pages
251-260. USENIX Assoc, Berkeley, CA, USA, 1999.
- [16]
- N.G. Duffield, P. Goyal,
A. Greenberg, Mishra Partho, K. K. Ramakrishnan, and J. E. Van der Merwe.
A flexible model for resource
management in virtual private networks.
Computer-Communication-Review, 29(4):95-108, October 1999.
- [17]
- Rik Farrow.
Virtual private networks: end-to-end
privacy or open-ended problems?.
Computer Security Journal, 14(3):1-6, 1998.
- [18]
- A. Ferchichi.
IPsec VPN: theory and practice.
ComTec, 78(7):9-14, 2000.
- [19]
- M. Günter, T. Braun,
and I. Khalil.
An
architecture for managing QoS-enabled VPNs over the Internet.
In Proceedings 24th Conference on Local Computer Networks. LCN'99,
pages 122-131. IEEE Comput. Soc, Los Alamitos, CA, USA, October 1999.
- [20]
- Vipul Gupta and Gabriel
Montenegro.
Secure
and mobile networking.
Mobile Networks and Applications, 3(4):381-390, January 1999.
- [21]
- Lee Haeryong, Hwang
Jeongyeon, Kang Byungryong, and Jun Kyoungpyo.
End-to-end
QoS architecture for VPNs: MPLS VPN deployment in a backbone
network.
In Proceedings 2000. International Workshop on Parallel
Processing., pages 479-483. IEEE Comput. Soc, Los Alamitos, CA, USA,
2000.
- [22]
- B. Hancock.
Virtual private
networks: what, why, when, where and how.
Network-Security, pages 8-11, August 1997.
- [23]
- E. Herscovitz.
Secure virtual private networks: the future of data communications.
International Journal of Network Management, 9(4):213-220, July
1999.
- [24]
- Shinkuro Honda, Hironari
Tomioka, Takaaki Kimurai, Takaharu Oosawa, Ken ichi Okada, and Yukata
Matsushita.
Valentine: An environment for home office worker providing informal
communication and personal space.
unbekannt, pages 368-375, 1997.
- [25]
- Richard S. Kagan.
Virtual
private networks - new strategies for secure enterprise networking.
In Wescon Conference Record 1998, pages 267-272. IEEE, September
1998.
- [26]
- W. P. Lu.
Providing confidentiality services for a lan interconnected service.
In Wireless Computer Communication. Emerging Business
Opportunities., pages 18-30. International Conference on Wireless
Computer Communication: Emerging Business Opportunities (Infocom'94). Tata
McGraw-Hill, New Delhi, India; 1995, 1995.
- [27]
- Patrick McLaughlin.
Structuring
your business around secure open distributed service management systems.
In IEEE Symposium Record on Network Operations and Management
Symposium, volume 2, pages 370-381. IEEE, 1996.
- [28]
- Masaya Norifusa.
Internet
security: Difficulties and solutions.
International Journal of Medical Informatics, 49(1):69-74, March
1998.
- [29]
- N. Okazaki, Rang-Park Mi,
A. Watanabe, S. Seno, T. Ideguchi, and M. Yabe.
Realization method of flexible private network system.
Transactions of the Institute of Electrical Engineers of Japan, Part
C, 120:1242-1249, August 2000.
- [30]
- Alberto Partida and Diego
Andina.
Applied
cryptography in java.
In IEEE Annual International Carnahan Conference on Security Technology,
Proceedings 1999, pages 345-348. IEEE, October 1999.
- [31]
- David Pensak and Mike
Grandinetti.
Internet and beyond: security data across the enterprise.
International Journal of Network Management, 5(6):305-312,
November 1995.
- [32]
- L. Rademacher and
B. Tunstall.
Virtual private networks: building secure data tunnels through the internet.
EDPACS, 26(1):1-6, July 1998.
- [33]
- M. Stern.
Extend your net with
VPNs, November 1997.
- [34]
- M. Terada, Y. Murayama, and
G. Mansfield.
Access control for inter-organizational computer network environment.
In Worldwide Computing and Its Applications. International Conference,
WWCA'97. Proceedings., pages 394-409. Springer-Verlag, Berlin,
Germany, 1997.
- [35]
- Tim Titheridge, Rob
Collingridge, and Graham Shorrock.
Bt intranet complete service.
British Telecommunications Engineering, 17(1):42-48, April
1998.
- [36]
- Akira Watanabe, Toru Inada,
Tetsuo Ideguchi, and Iwao Sasase.
Proposal of
group search protocol making secure communication groups for intranet.
In IEEE International Conference on Communications, volume 2,
pages 877-881. IEEE, Piscataway, NJ, USA, June 2000.
- [37]
- M. A. Wright.
Virtual private
network security.
Network-Security, pages 11-14, July 2000.
- [38]
- Qun Zhong.
Providing secure
environments for untrusted network applications: with case studies using
virtualvault and trusted sendmail proxy.
Technical report, HP Lab Bristol, Bristol, UK, 1997.