期刊文献+

SSL VPN网络安全技术的应用研究 被引量:26

A Study on Application of SSL VPN Network Security Technology
原文传递
导出
摘要 企业通过Internet允许员工、客户以及合作伙伴访问企业内部的资源已成为一种趋势,但需要提供一种安全接入机制来保障网络安全。文中分析了SSL VPN网络安全技术的基本原理及其实际应用,通过与IPSec VPN的比较,SSL VPN技术有着显著优点,同时也有其缺陷。指出SSL VPN技术由于拥有全方位的优势,取代传统的组网技术成为主流已为时不远。 It has become a trend for the enterprises to allow their staff, customers and partners to access their private resources through the internet, and this requires a security access mechanism to ensure the network security. The paper analyzes the fundamental theories of SSL VPN network security technology and its practical applications. Its merits are distinct by comparison with IPSec VPN and its shortcomings are also pointed out. It suggests that SSL VPN owing to its all-round superiority, would soon replace the traditional net working and become the dominant network security technology.
作者 寻大勇
出处 《通信技术》 2009年第1期248-249,252,共3页 Communications Technology
关键词 SSL VPN 网络安全技术 应用 SSL VPN network security technology application
  • 相关文献

参考文献4

  • 1梁晋.电子商务核心技术-安全电子交易协议的理论与设计[M].西安:西安电子科技大学出版社,2001.
  • 2欧阳凯,周敬利,夏涛,余胜生.基于虚拟服务的SSL VPN研究[J].小型微型计算机系统,2006,27(2):228-232. 被引量:15
  • 3COHEN R. On the establishment of an access VPN in broadband access networks[J]. Communications Magazine, IEEE, 2003, 41(2): 156-163.
  • 4贾晶.信息系统的安全与保密[M].北京:清华大学出版社,2005.

二级参考文献10

  • 1Cohen R.On the establishment of an access VPN in broadband access networks[J].Communications Magazine,IEEE February 2003,41(2):156-163.
  • 2Kent S,Atkinson R.Security architecture for the internet protocol[S].RFC2401,November 1998.
  • 3Dierks T,Allen C.The TLS protocol version 1.0[S].RFC2246,January 1999.
  • 4Rescorla E,Schiffman A.The secure HyperText transfer protocol[S].RFC2660,August 1999.
  • 5Sandhu R S,Coyne E J,Feinstein H,Youman C.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 6Dimitrakos T,Djordjevic I,Matthews B,et al.Policy-driven access control over a distributed firewall architecture[J].Policies for Distributed Systems and Networks,2002:228-231.
  • 7Jason J,Rafalow L,Vyncke E.IPSec configuration policy information model[S].RFC3585,August 2003.
  • 8Xin Guo,Kun Yang,Galis A,et al.A Policy-based network management system for IP VPN[C].Communication Technology Proceedings,2003.ICCT 2003.2003,(2):1630-1633.
  • 9Ryutov T,Neuman C,Dongho Kim.Integrated access control and intrusion detection for Web servers[J].Parallel and Distributed Systems,IEEE Transactions.September 2003,(14):841-850.
  • 10Bhatt D V,Schulze S,et al.Secure internet access to gateway using secure socket layer[J].Virtual Environments.Human-Computer Interfaces and Measurement Systems.2003:157-162.

共引文献16

同被引文献124

引证文献26

二级引证文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部