期刊文献+

基于IP的点对点分布式VPN系统 被引量:2

Point-to-Point Distributed VPN System Based on IP
下载PDF
导出
摘要 对传统虚拟专用网的概念进行扩展,提出并建立了分布式虚拟专用网的模型,解决了传统虚拟专用网系统内部无法防止的搭线窃听问题。对分布式虚拟专用网的性能改进作了定量分析,分析结果显示其可以大幅度提高系统的并行性,且单个节点存储容量从O(n2)下降到O(n),实现增长线性化,并给出一个系统实现,测试结果表明可以显著改善系统的安全性和提高效率。 Raise the concept of distributed VPN and create the system model, which extend the concept of classical VPN. From the as aspects of security, it overcome the classical VPN抯 disadvantages of failing to protect the internal communication of LANs. The result of DVPN's performance analyzing indicates that it can enhance the parallelity of the system,reduce the storage requirement from complexity O(n2) to O(n) and make the database grow linearly. As well,give a system implementation, which proves that it can improve the security and efficiency of the system.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2004年第1期67-70,共4页 Journal of University of Electronic Science and Technology of China
关键词 虚拟专用网 分布式虚拟专用网 IP安全性 安全策略数据库 安全关联数据库 virtual private network distributed virtual private network IP security security policy database security association database
  • 相关文献

参考文献10

  • 1[1]Anddrew, Tanenbaum S. Distributed operating systems[M]. Second Edition, Beijing, 1999
  • 2[2]Mukesh, Singhal, Niraniang, et al. Advanced concepts in operating systems distributed database and multiprocessor operating systems[M]. First Edition, Mc. Graw Hill, 1994
  • 3[3]Kent S, Atkinson R. Security architecture for the internet protocol[S]. RFC2401 1998
  • 4[4]Kent S, Atkinson R. IP authentication header[S]. RFC2402 1998
  • 5[5]Kent S, Atkinson R. IP encapsulating security payload (ESP)[S]. RFC2406 1998
  • 6[6]Piper D. The Internet IP security domain of interpretation for ISAKMP[S]. RFC2407 1998
  • 7[7]Maughan D, Schertler M, et al. Internet security association and key management protocol (ISAKMP)[S]. RFC2408 1998
  • 8[8]Harkins D, Carrel D. The internet key exchange (IKE)[S]. RFC2409 1998
  • 9[9]Rescorla E. Diffie-hellman key agreement method[S]. RFC2631 1999
  • 10[10]Schneier B. Applied cryptography: protocols, algorithms and source code in C[M]. Second Edition, Beijing, China Machine Press, 2000

同被引文献8

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部