TITLE

Securing Internet VPNs

AUTHOR(S)
Kosiur, Dave
PUB. DATE
August 1997
SOURCE
PC Week;08/25/97, Vol. 14 Issue 36, p89
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the use of virtual private networks (VPN), or a secure connection between two or more locations over the Internet. Why VPNs are attractive to corporations; Security issues; Work by the Internet Engineering Task Force on the IPSec standard which will define open protocols for a secure Internet; Standardized multilayered security; Procedures for securing the contents of datagrams between firewalls.
ACCESSION #
9709096375

 

Related Articles

  • High Security Nested PWLCM Chaotic Map Bit-Level Permutation Based Image Encryption. Nasir, Qassim; Abdlrudha, Hadi H. // International Journal of Communications, Network & System Scienc;Sep2012, Vol. 5 Issue 9, p548 

    Chaotic systems produce pseudo-random sequences with good randomness; therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Linear Chaotic Map (NPWLCM) is proposed. Bit planes of the grey or color levels...

  • Enhancing the Communication Channel Through Secure Shell And Irrational DES. Krishna, S. R. M.; Jamwal, Paradeep Singh; Priya, K. Padma; Vishnu, P. Hema // International Journal on Computer Science & Engineering;2011, Vol. 3 Issue 3, p1020 

    As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum.most data transfer are...

  • A PROFICIENT TRACEBACK APPROACH USING PROVINCIAL LOCALITY ASPECTS TO ELIMINATE DENIAL OF SERVICE ATTACKS. Periyasamy, S.; Duraiswamy, K. // Journal of Computer Science;Feb2013, Vol. 9 Issue 2, p271 

    A Denial-of-Service (DoS) attack, a menace to the availability of resources and service to the intended user, is usually by augmenting the traffic in the communication medium. These attacks originate in either ways, internal or external to a network with the aim to suspend the legitimate user...

  • Living with the bugs. Levy, Steven // Newsweek (Pacific Edition);08/24/98 (Pacific Edition), Vol. 132 Issue 8, p2 

    Comments on Internet security, e-mail protection, and file security. The form of computer attack known as overflow buffer; The difficulty of keeping information safe when computers are getting more connected; Concern that flaws in network security will lead to disaster; How software companies,...

  • Living with the bugs. Levy, Steven // Newsweek (Atlantic Edition);08/24/98 (Atlantic Edition), Vol. 132 Issue 8, p2 

    Comments on Internet security, e-mail protection, and file security. The form of computer attack known as overflow buffer; The difficulty of keeping information safe when computers are getting more connected; Concern that flaws in network security will lead to disaster; How software companies,...

  • Safe Data Transmission Architecture Based on Cloud for Internet of Things. Kim, Seokhoon; Na, Wonshik // Wireless Personal Communications;Jan2016, Vol. 86 Issue 1, p287 

    Nowadays, cloud computing technology, and IoT technology are one of the inevitable core trends. These technologies are key technology of various ICT convergence services, and it will create a value-added business and market. Although it is in its infancy, there is no doubt that it will be a game...

  • WHAT GOES AROUND.  // BRW;8/21/2008, Vol. 30 Issue 33, p31 

    The article discusses the technology called software as a service (SaaS), which used to be referred to as application service provision. SaaS products are less expensive, safer and more reliable due to the improved access to the Internet, better security for the transmission of data and the...

  • Living with the bugs. Levy, Steven // Newsweek;8/17/1998, Vol. 132 Issue 7, p68 

    Comments on Internet security, e-mail protection, and file security. The form of computer attack known as overflow buffer; The difficulty of keeping information safe when computers are getting more connected; Concern that flaws in network security will lead to disaster; How software companies,...

  • Effective Rekeying Architecture for Dynamic Multicast Group. Vijayaraghavan, V.; Wahidabanu, R. S. D. // Information Technology Journal;2007, Vol. 6 Issue 2, p247 

    Developments in the area of group communication have been enormous. Multicasting is the group communication paradigm of future, as it saves bandwidth considerably. The main features that makes multicasting as an attractive one, also makes security and the related tasks still a subject of...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics