38 references, last updated Thu Apr 19 12:19:45 2001

[1]
R. M. Alguliev. Method of selecting the optimal structure of a distributed authentication system in virtual private networks. Automatic-Control-and-Computer-Sciences, 33(3):12-21, 1999.

[2]
William A. Arbaugh, James R. Davin, David J. Farber, and Jonathan M. Smith. Security for virtual private intranets. Computer, 31(9):48-54, September 1998.

[3]
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, and Tai-Myoung Chung. Policy-based hybrid management architecture for IP-based VPN. In IEEE Symposium Record on Network Operations and Management, pages 987-988. IEEE, Piscataway, NJ, USA, April 2000.

[4]
Tina Bird. Building VPNs: The 10-point plan. Data Communications, 27(9):123, 124, 126, 128, 130, 132, June 1998.

[5]
Nora Boukari and Ali Aljane. Security and auditing of VPN. In Proceedings of the International Workshop on Services in Distributed and Networked Environments, pages 132-138. IEEE, 1996.

[6]
C. A. Bower and S. J. Lodico. Security and access: new technologies in wide area networks. In 15th Annual Computers in Libraries 2000. Proceedings - 2000, pages 25-30. Inf. Today, Medford, NJ, USA, 2000.

[7]
William Cheung. Building multiservice internet protocol virtual private networks. Proceedings of SPIE - The International Society for Optical Engineering, 3845:340-349, September 1999.

[8]
Tse-Huong Choo. Vaulted VPN: Compartmented virtual private networks on trusted operating systems. Technical report, HP Lab Bristol, Bristol, UK, March 1999.

[9]
Mooi Choo Chuah and Enrique J. Hernandez-Valencia. Mobile virtual private dial-up services. Bell-Labs-Technical-Journal, 4(3):51-72, July 1999.

[10]
Andrew Cray. Secure VPNs: Lock the data, unlock the savings. Data Communications, 26(7):49-56, May 1997.

[11]
Andrew Cray. Armed compounds. Data Communications, 27(6):57-62, 64, April 1998.

[12]
Chris I. Dalton and D. A. Clarke. Secure partitioned access to local network resources over the internet. Technical report, HP Lab Bristol, Bristol, UK, December 1998.

[13]
J. Davila, J. Lopez, and R. Peralta. Implementation of virtual private networks at the transport layer. In Information Security. Second International Workshop, ISW'99., volume 1729, pages 85-102. Springer-Verlag, Berlin, Germany, 1999.

[14]
L. Delgrossi and D. Ferrari. The design of supranet security mechanisms. In 7th IEEE Intelligent Network Workshop Proceedings, pages 167-173. IEEE, 1998.

[15]
J.S. Denker, S.M. Bellovin, H. Daniel, N.L. Mintz, T. Killian, and M.A. Plotnick. Moat: a virtual private network appliance and services platform. In 13th Systems Adminstration Conference (LISA '99)., pages 251-260. USENIX Assoc, Berkeley, CA, USA, 1999.

[16]
N.G. Duffield, P. Goyal, A. Greenberg, Mishra Partho, K. K. Ramakrishnan, and J. E. Van der Merwe. A flexible model for resource management in virtual private networks. Computer-Communication-Review, 29(4):95-108, October 1999.

[17]
Rik Farrow. Virtual private networks: end-to-end privacy or open-ended problems?. Computer Security Journal, 14(3):1-6, 1998.

[18]
A. Ferchichi. IPsec VPN: theory and practice. ComTec, 78(7):9-14, 2000.

[19]
M. Günter, T. Braun, and I. Khalil. An architecture for managing QoS-enabled VPNs over the Internet. In Proceedings 24th Conference on Local Computer Networks. LCN'99, pages 122-131. IEEE Comput. Soc, Los Alamitos, CA, USA, October 1999.

[20]
Vipul Gupta and Gabriel Montenegro. Secure and mobile networking. Mobile Networks and Applications, 3(4):381-390, January 1999.

[21]
Lee Haeryong, Hwang Jeongyeon, Kang Byungryong, and Jun Kyoungpyo. End-to-end QoS architecture for VPNs: MPLS VPN deployment in a backbone network. In Proceedings 2000. International Workshop on Parallel Processing., pages 479-483. IEEE Comput. Soc, Los Alamitos, CA, USA, 2000.

[22]
B. Hancock. Virtual private networks: what, why, when, where and how. Network-Security, pages 8-11, August 1997.

[23]
E. Herscovitz. Secure virtual private networks: the future of data communications. International Journal of Network Management, 9(4):213-220, July 1999.

[24]
Shinkuro Honda, Hironari Tomioka, Takaaki Kimurai, Takaharu Oosawa, Ken ichi Okada, and Yukata Matsushita. Valentine: An environment for home office worker providing informal communication and personal space. unbekannt, pages 368-375, 1997.

[25]
Richard S. Kagan. Virtual private networks - new strategies for secure enterprise networking. In Wescon Conference Record 1998, pages 267-272. IEEE, September 1998.

[26]
W. P. Lu. Providing confidentiality services for a lan interconnected service. In Wireless Computer Communication. Emerging Business Opportunities., pages 18-30. International Conference on Wireless Computer Communication: Emerging Business Opportunities (Infocom'94). Tata McGraw-Hill, New Delhi, India; 1995, 1995.

[27]
Patrick McLaughlin. Structuring your business around secure open distributed service management systems. In IEEE Symposium Record on Network Operations and Management Symposium, volume 2, pages 370-381. IEEE, 1996.

[28]
Masaya Norifusa. Internet security: Difficulties and solutions. International Journal of Medical Informatics, 49(1):69-74, March 1998.

[29]
N. Okazaki, Rang-Park Mi, A. Watanabe, S. Seno, T. Ideguchi, and M. Yabe. Realization method of flexible private network system. Transactions of the Institute of Electrical Engineers of Japan, Part C, 120:1242-1249, August 2000.

[30]
Alberto Partida and Diego Andina. Applied cryptography in java. In IEEE Annual International Carnahan Conference on Security Technology, Proceedings 1999, pages 345-348. IEEE, October 1999.

[31]
David Pensak and Mike Grandinetti. Internet and beyond: security data across the enterprise. International Journal of Network Management, 5(6):305-312, November 1995.

[32]
L. Rademacher and B. Tunstall. Virtual private networks: building secure data tunnels through the internet. EDPACS, 26(1):1-6, July 1998.

[33]
M. Stern. Extend your net with VPNs, November 1997.

[34]
M. Terada, Y. Murayama, and G. Mansfield. Access control for inter-organizational computer network environment. In Worldwide Computing and Its Applications. International Conference, WWCA'97. Proceedings., pages 394-409. Springer-Verlag, Berlin, Germany, 1997.

[35]
Tim Titheridge, Rob Collingridge, and Graham Shorrock. Bt intranet complete service. British Telecommunications Engineering, 17(1):42-48, April 1998.

[36]
Akira Watanabe, Toru Inada, Tetsuo Ideguchi, and Iwao Sasase. Proposal of group search protocol making secure communication groups for intranet. In IEEE International Conference on Communications, volume 2, pages 877-881. IEEE, Piscataway, NJ, USA, June 2000.

[37]
M. A. Wright. Virtual private network security. Network-Security, pages 11-14, July 2000.

[38]
Qun Zhong. Providing secure environments for untrusted network applications: with case studies using virtualvault and trusted sendmail proxy. Technical report, HP Lab Bristol, Bristol, UK, 1997.