期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A Multi-homed VPN Architecture Based on Extended SOCKS+TLS Protocols
1
作者 张宝良 胡汉平 陈翔 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期250-255,共6页
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio... A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts. 展开更多
关键词 multi-homed SOCKSv5 security connection context virtual private network vpn
在线阅读 下载PDF
SUPPORTING MPLS VPN MULTICAST
2
作者 WangYufeng WangWendong ChengShiduan 《Journal of Electronics(China)》 2004年第1期48-54,共7页
MPLS(Multi-Protocol Label Switching) VPN(Virtual Private Network) traffic has been deployed widely, but currently only supports unicast. This paper briefly introduces several available MPLS VPN multicast approaches, a... MPLS(Multi-Protocol Label Switching) VPN(Virtual Private Network) traffic has been deployed widely, but currently only supports unicast. This paper briefly introduces several available MPLS VPN multicast approaches, and then analyzes their disadvantages. A novel mechanism that uses two-layer label stack to support MPLS VPN explicit multicast is proposed and the process is discussed in detail. The scalability and performance of the proposed mechanism are studied analytically. The result shows that our solution has great advantage over the currently available scheme in terms of saving core network bandwidth and improving the scalability. 展开更多
关键词 Multi-Protocol Label Switching(MPLS) virtual private network(vpn) Two-layer label stack Explicit multicast
在线阅读 下载PDF
Application of VPN in e-Business
3
作者 刘爽英 李博 《Journal of Measurement Science and Instrumentation》 CAS 2012年第3期248-250,共3页
With the development of lnternet, eBusiness has gradually become a new model for business activity, however, the security of eBusiness is a major bottleneck restricting the development of eBusiness. Network with virtu... With the development of lnternet, eBusiness has gradually become a new model for business activity, however, the security of eBusiness is a major bottleneck restricting the development of eBusiness. Network with virtual private net work(VPN) can reduce network costs and communication costs, increase flexibility and provide safe and smooth network for the corporations that do eBusiness across regions. This article introduces the definition and the technological core of VPN, and researches and analyzes the VPN application in ecommerce. 展开更多
关键词 E-BUSINESS lnternet security virtual private networkvpn TUNNEL
在线阅读 下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
4
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote Access Communications Security User Authentication 2FA virtual private network (vpn) TELECOMMUTING Threats VULNERABILITIES
在线阅读 下载PDF
Research on Concurrent Design of Collaborative Product Commerce Oriented Discrete Manufacturing Enterprises
5
作者 刘丽兰 俞涛 +1 位作者 方明伦 王晓红 《Journal of Shanghai University(English Edition)》 CAS 2003年第1期80-83,共4页
In order to fulfill the product concurrent design requirements of discrete manufacturing enterprises, this paper puts forth for the first time a Collaborative Product Commerce (CPC) oriented X2D (X to Design) theory, ... In order to fulfill the product concurrent design requirements of discrete manufacturing enterprises, this paper puts forth for the first time a Collaborative Product Commerce (CPC) oriented X2D (X to Design) theory, which can take Collaboration, Commerce and Concurrence (3C) into realization during the product design stage. At the same time, this research adopts VPN (Virtual Private Network) technique to ensure the security of product data and information during transportation. By building CPC oriented and VPN based framework of X2D product concurrent design system, the paper explores a way for discrete enterprises adapting to the drastically competitive market and performing their product innovation. 展开更多
关键词 collaborative product commerce (CPC) concurrent design X2D virtual private networks (vpn).
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部