期刊文献+

基于公网的VPN技术及在大型企业集团中的应用 被引量:1

VPN Technology Based on Public Network and Its Applications in Large Enterprise Groups
下载PDF
导出
摘要 虚似专用网(VPN)技术是当今网络技术领域中新的热点。目前,企业之间以及企业的总部与分支机构通过网络连接越来越频繁,且经常跨系统跨地域,网内网际情况都比较复杂,造成企业远程通信访问成本偏高,另外还带来了网络的管理和安全性问题。VPN网络技术的诞生较好地解决了企业总部与分支之间信息的交流和数据交换等问题。以《葛洲坝水泥厂分布式销售系统》为实例,说明了基于公网的VPN技术及在大型企业集团中的应用。 Virtual Private Network(VPN) technology is a novelty hot spot in the field of today's network technology. Presently, network connections between enterprises as well as those between their corporate headquarters and branch offices have become more and more frequent, which often go across boundaries of systems and regions with complexities within and between' the networks, at the consequence of high costs in business telecommunications access with problems in management and security. The birth of VPN network technology has properly solved the matter of information exchange and data exchange between corporate headquarters and their branches. In the paper, Distributed Sales System in Gezhouba Cement Plant has been exemplified to illustrate public network-based VPN technology and its applications in large enterprise groups.
出处 《武汉科技学院学报》 2010年第2期44-47,共4页 Journal of Wuhan Institute of Science and Technology
基金 中国葛洲坝集团水泥公司分布式销售系统
关键词 虚似专用网 企业网络建设 远程访问 销售系统 VPN enterprise network construction remote access sales system
  • 相关文献

参考文献13

  • 1Snader j C. VPNs ILLUSTRATED: Tunnels, VPNs, and IPSec[M]. Addison-Wesley, 2006.
  • 2Khanvilkar Shashank,Khokhar Ashfaq. Experimental evaluations of 3pen-source linux-based VPNs of solutions[C]. Proceedings-13^th International Conference on Computer Communications and Networks, ICCCN2004, 2004:181-186.
  • 3Fisli R. Secure Corporate Communications over VPN-BasedWANs, Masters Thesis in Computer Science at the School of Computer Science and engineering, Royal Institute of Technology, Sweden, 2005.
  • 4Khanvilkar S, Khokhar A. Virtual Private Networks: An Overview with Performance Evaluation[J], IEEE Communications Magazine, 2004(10): 146-154.
  • 5Berger T, AnalySis of current VPN technologies[C], in The First International Conference On Availability, Reliability and Security, 2006. ARES 2006, 2006: 8-13.
  • 6Khanvilkar S, Khokhar A. Experimental Evaluations of Open-Source Linux-bases VPN Solutions[M]. 2004:181 - 186.
  • 7DONG Lijun, YU Shengsheng, OUYANG Kai. The Dynamic Endpoint- Based Access Control Model on VPN[C]. International Conference on Networking, Architecture, and Storage, 2007. NAS 2007, 2007: 44-54.
  • 8OUYANG Kai, ZHOU Jing-li, XIA Tao, YU Sheng-sheng, An application-layer based centralized information access control for VPN[J]. Journal of Zhejiang University Science A,2006, 7(2): 44-48.
  • 9陶国芳,张量.帧中继环境下IPSec VPN的配置实现[J].微计算机信息,2006,22(03X):134-136. 被引量:7
  • 10孟艳红,秦维佳,辛义忠.基于数据加密的网络通信系统的设计与实现[J].沈阳工业大学学报,2004,26(1):93-95. 被引量:9

二级参考文献11

  • 1路海,曹小白,黄建华.基于片上系统的IPSec专用网关的设计[J].微计算机信息,2005,21(07Z):61-62. 被引量:7
  • 2[2]Meier W.On the security of the IDEA block cipher[J].Advances in Cryptology-Eurocrypt'93 Proceedings,1994(3):371-385.
  • 3[3]RSA Algorithm,http://www.di-mgt.com.an/rsa-alg.htm
  • 4[5]Orfali R,Harkey D,Edwards J.Client/Server Survival Guide[M].3rd Edition,January,1999.
  • 5Stojanovski T, Kocarev L. Chaos-Based Random Number Generators-Part l: Analysis. IEEE Transactions on Circuits System-l:Fundamental Theory and Application, 2001, 48(3): 281-288.
  • 6Jakimoski, Kpcarev L Chaos and Cryptography. Block Encryption Ciphers Based on Chaotic Maps. IEEE Transactions on Circuits System-l: Fundamental Theory and Application, 2001, 48(2): 163-169.
  • 7Clark D L.虚拟专用网【M】,于秀莲译.北京,人民邮电出版社.2000.
  • 8Karl Solie.CCIE实验指南[M].李津卓林译,北京,人民邮电出版社.2002.
  • 9王相生,甘骏人.一种基于混沌的序列密码生成方法[J].计算机学报,2002,25(4):351-356. 被引量:45
  • 10王同庆,陆平.一种对DES算法实现的改进方法[J].计算机应用研究,2003,20(4):95-96. 被引量:4

共引文献17

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部