期刊文献+

IP-VPN技术研究与发展 被引量:1

Study and Development of IP Based Virtual Private Net Works
在线阅读 下载PDF
导出
摘要 本文讨论了IP -VPN的概念及特点 ,分析了IP -VPN的工作原理、主要应用模式 ,最后着重探讨了隧道技术、安全协议、VPN安全管理、QoS管理和嵌入式安全平台等对IP -VPN研究与发展有重要影响的几个关键技术。 This paper presents the concept and characteristics of IP-VPN (IP Based Virtual Private Networks),dis cusses the principles and main application models and analyzes several critical IP-VPN techniques,i.e.IP tunneling,security protocol,VPN security management,QoS management and embedded security platform.
出处 《信息工程大学学报》 2000年第4期19-23,共5页 Journal of Information Engineering University
基金 河南省自然科学基金!资助项目 (9940 6 0 10 0 )
关键词 IP-VPN IP隧道 安全协议 QOS VPN安全管理 嵌入式安全平面 INTERNET 虚拟专用网络 网络安全 IP-VPN IP tunneling security protocol QoS VPN security management embedded security platf<
  • 相关文献

参考文献9

  • 1陈性元,宋国文.IP-VPN及其关键技术[J].电信科学,2000,16(5):38-42. 被引量:9
  • 2Internet Engineering Task Force[S] .RFC 1825, 1826,1827,2401,2402,2406, 2408,2409,2410,2764, 2205,2003,1631,2430 ,1928 , http : www.ietf.org.
  • 3B Schneier et al. Cryptanalysis of Microsoft' s Point - to -Point Tunneling Protocol(PPTP)[A].Proceedings of the 5th ACM Conference on Communications and Computer Security [C],ACM Press, 1998.11.
  • 4T Jenkins et al. IPsec Monitoring MIB[Z]. draft - ietf- ipsec- monitor - mib- 02.txt, http://www.ietf.org, 1999. 10.
  • 5A Terzis et al.RSVP Operation Over IP Tunnels[Z].intemet- drafts. draft -ielf - rsvp - turmel - 04. txt, http://www.ieff. org, 1999.5.
  • 6B Aboba et al. DHCP Configuration of IPSEC Tunnel Mode [Z].internet-drafts,draft-ietf-ipsoc-dhcp-03.txt http://ww. ietf. org, 1999.10.
  • 7RSA Labs.Factorization of RSA- 155[R] .http://www. rsa.com/rsalaba/html/rsa 155.htm, 1999.
  • 8杨波,杨永斌.基于SNMP++和Web的网络管理系统研究[J].小型微型计算机系统,1999,20(6):460-463. 被引量:5
  • 9T K Apostolopoulos et al. Security management using a security MIB approach[A]. 15th IFIP World Computer Congress:The Global Information Society on the Way to the Next Millennium[C] ,1998.5.

二级参考文献8

  • 1安常青,李学农,李小乔,岑贤道.基于SNMP的网络流量管理系统[J].计算机工程与应用,1997,33(5):14-18. 被引量:13
  • 2安常青,计算机工程与应用,1997年,4卷,334期,14页
  • 3Gleeson B,et al.A framework for IP based virtual private networks,intemet-drafts,<draft-gleeson-vpn-framework-02.txt> Expires April 2000.
  • 4Internet Engineering Task Force,RFC 1825,1826,1827,2401,2402,2406,2408,2409,2410,2205,2003,1631,2430,1928,[http://www.ietf.org].
  • 5Schneier B,et al.Cryptanalysis of microsoft's point-to-point tunneling protocol(PPTP),In:Proceedings of the 5th ACM conference on conununications and computer security,ACM press,1998:132-141.
  • 6RSA Labs.Factorization of RSA-155,1999,[http://www.rsa.com/rsalabs/html/rsa155.Htm].
  • 7Apostolopoulos T K,et al.Security management using a security MIB approach.15th IFIP world computer congress:the global information society on the way to the nex millennium,1998.
  • 8杨波,杨永斌.基于SNMP++和Web的网络管理系统研究[J].小型微型计算机系统,1999,20(6):460-463. 被引量:5

共引文献12

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部