Virtual Private Networking: Enhancing Security for E-Business TR-ANL-2002-04-01
نویسندگان
چکیده
With the Internet penetrating every corner of the world, e-business has found an excellent carrier which is able to fulfill the information transfer among diverse areas. Virtual private networking, a booming value-added service over the Internet, offers a low-cost, high-security, and easy-tomanage solution for e-business applications and services. The article introduces the implementation of Virtual Private Networks (VPNs), by portraying a generic deployment process following with certain details. The comparison and discussion in the article shall benefit service providers seeking for new avenues, and enterprises longing for supreme e-business services as well.
منابع مشابه
Advanced Networking Laboratory Virtual Queue Occupancy and Its Applications on Periodic Bandwidth On Demand Schemes for IP/SONET TR-ANL-2002-03-02
Carrying IP traffic over connection-oriented networks requires the use of bandwidth on demand schemes at gateways or network interfaces. A new virtual queue occupancy, which is more accurate than the classical one, is being proposed for IP/SONET bandwidth on demand. Based on the virtual queue occupancy, two enhanced periodic approaches for lossless services, LAVQ and LAVQL, are simulated and ev...
متن کاملAdvanced Networking Laboratory Forward Resource Reservation For QoS Provisioning in OBS Systems TR-ANL-2002-04
This paper addresses the issue of providing QoS services for Optical Burst Switching (OBS) systems. We propose a Linear Predictive Filter (LPF)-based Forward Resource Reservation method to reduce the burst delay at edge routers. An excessive reservation method is utilized to increase the successful forward reservation probability and to improve the delay reduction performance. We also discuss a...
متن کاملPrivate Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing UMBC Computer Science Technical Report Number TR-CS-10-04
Private Virtual Infrastructure is a security architecture for cloud computing which uses a new trust model to share the responsibility of security in cloud computing between the service provider and client, decreasing the risk exposure to both. Private Virtual Infrastructure is under control of the information owner while the cloud fabric is under control of the service provider. The Private Vi...
متن کاملOn the Delay Bound of Youngest Serve First (YSF) Aggregated Packet Scheduling TR-ANL-2002-03-04
In this paper, we propose a simple scalable aggregated traffic scheduling scheme, called the Youngest Serve First (YSF) algorithm. We show analytically that YSF can provide bounded end-to-end delay time with high link utilization that may not be possible for the FIFO scheme.
متن کاملA Trust Management System in Mobile Enterprise Networking
Trust is crucial for mobile communications. However, how to manage trust in mobile enterprise networking among various mobile devices is problematic for companies using mobile enterprise solutions. This paper presents a trust management system in an enterprise’s virtual private networks (VPN). The system supports confidential content management and overcomes the diversity support of security in...
متن کامل