期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Application of VPN in e-Business
1
作者 刘爽英 李博 《Journal of Measurement Science and Instrumentation》 CAS 2012年第3期248-250,共3页
With the development of Internet,e-Business has gradually become a new model for business activity,however,the security of e-Business is a major bottleneck restricting the development of e-Business.Network with virtua... With the development of Internet,e-Business has gradually become a new model for business activity,however,the security of e-Business is a major bottleneck restricting the development of e-Business.Network with virtual private network(VPN)can reduce network costs and communication costs,increase flexibility and provide safe and smooth network for the corporations that do e-Business across regions.This article introduces the definition and the technological core of VPN,and researches and analyzes the VPN application in e-commerce. 展开更多
关键词 E-BUSINESS Internet security virtual private network(vpn) TUNNEL
下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
2
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote Access Communications Security User Authentication 2FA virtual private network (vpn) TELECOMMUTING Threats VULNERABILITIES
下载PDF
Research on Concurrent Design of Collaborative Product Commerce Oriented Discrete Manufacturing Enterprises
3
作者 刘丽兰 俞涛 +1 位作者 方明伦 王晓红 《Journal of Shanghai University(English Edition)》 CAS 2003年第1期80-83,共4页
In order to fulfill the product concurrent design requirements of discrete manufacturing enterprises, this paper puts forth for the first time a Collaborative Product Commerce (CPC) oriented X2D (X to Design) theory, ... In order to fulfill the product concurrent design requirements of discrete manufacturing enterprises, this paper puts forth for the first time a Collaborative Product Commerce (CPC) oriented X2D (X to Design) theory, which can take Collaboration, Commerce and Concurrence (3C) into realization during the product design stage. At the same time, this research adopts VPN (Virtual Private Network) technique to ensure the security of product data and information during transportation. By building CPC oriented and VPN based framework of X2D product concurrent design system, the paper explores a way for discrete enterprises adapting to the drastically competitive market and performing their product innovation. 展开更多
关键词 collaborative product commerce (CPC) concurrent design X2D virtual private networks (vpn).
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部