نتایج جستجو برای: vpn سیار

تعداد نتایج: 1850  

Journal: : 2021

В статті проаналізовано основні підходи до забезпечення живучості комп’ютерних мереж. Показано, що методологія живучості, яка застосовується систем має часткову відмінність за ту, мереж, пов’язано з активним розвитком технологій віртуалізації. Метою є розробка методу, який дозволяє забезпечити живучість комп’ютерної мережі, інформаційним середовищем для гарантованого надання цифрових послуг, шл...

Journal: :Jurnal nasional komputasi dan teknologi informasi 2023

Abstrak - Teknologi informasi saat ini berkembang sangat cepat, dinamis dan canggih. Seiring dengan perkembangannya, PT. Jaindo Metal Industries membangun jaringan komputer berbasis VPN untuk mempermudah melakukan kegiatan operasional antar kantor cabang pusat, seperti transaksi data atau presentasi melalui jalur publik, salah satunya penggunaan bersama aplikasi bisnis Microsoft Dynamic Axapta ...

2000
Patricia Lago Riccardo Scandariato

The objective of this work is to support dynamic (i.e. on demand) VPN provisioning. To this aim, this paper presents an information model describing Virtual Private Networks (VPNs) at a high level of abstraction. The information model is based on COPS and TINA concepts. The paper also proposes an architecture for dynamic VPN control based on the defined information model. The proposed model is ...

2004
Tim Likarish Eric Anholt Biljana Risteska Valentina Grigoreanu Jens Mache Chris Stevens

A Virtual Private Network (VPN) offers a secure connection over an insecure network such as the Internet. Driven by an ever expanding mobile workforce and by the need for a cheaper alternative to private leased lines, the security community responded with a variety of VPN solutions deployed in a diverse array of software and hardware. Traditional VPNs offer good netto-net (site-to-site) connect...

2001
Markosz Maliosz Tibor Cinkler

The route configuration of Virtual Private Networks (VPNs) over a given physical network is addressed considering the protection. We analyze protection at two different layers, first when the operator protects the virtual links of the VPN and second when the protection is done within the VPN. The problem is formulated as a general model without specializing to any particular network type, howev...

Journal: :PoPETs 2015
Vasile Claudiu Perta Marco Valerio Barbera Gareth Tyson Hamed Haddadi Alessandro Mei

Commercial Virtual Private Network (VPN) services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as ...

Journal: :Journal of the ACM 2013

2005
Patrick George Gérald Maunier

With PC manufacturers aggressively pushing trusted architectures in their new models, Trusted Platforms are quickly becoming a major component of the IT landscape. These platforms embed a security chip, the Trusted Platform Module (TPM), that is primarily used to attest the integrity of the system but that can also accurately identify the platform. While platform identification raises privacy i...

2005
James T. Yu

This paper presents the use of SoftEther in supporting networking education. SoftEther is a tool to create a tunnel-based Virtual Private Network (VPN). Unlike Layer 2 tunneling protocol (L2TP) or Point to Point Tunneling Protocol (PPTP), SoftEther uses an upper layer protocol (Secured Socket Layer) to emulate a lower layer interface (Ethernet). This scheme is more flexible and easier to config...

2015
M. Kanmani

Recently MPLS is used for building up VPNs in IP backbone, called MPLS VPN. To provide people with voice, data and all categories of multimedia services, distinguishing between data flows is a requirement. To address these router performance, Quality of Service and traffic engineering issues, Multi Protocol Label Switching (MPLS) was proposed for IP based internetworks. To achieve the security ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید