The Research of SSL VPN Authentication Methods Based on C + +

Article Preview

Abstract:

In order to better meet the government, enterprises, schools and other units of information transmission of the security and confidentiality, this paper studies SSL handshake protocol and SSL Record Protocol, authentication technology and PKI technology, based on in-depth study of Web-based Off mode SSL VPN system architecture, gives a more detailed block diagram of the design ideas and design. Finally, a C + + based on the SSL VPN authentication methods, The results of the research staff with the actual VPN network value.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1081-1086

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sun-bo Xiang SSL VPN security analysis [J] Chengde Petroleum College, 2009, 11 (1) : 12-16.

Google Scholar

[2] Deng Ming SSL VPN and security related introduced research [J] ISSN 1009-3044Computer Knowledge and Technology Vol. 5, No. 21, July (2009).

Google Scholar

[3] You-xuan Chen, Guang-yu Wu of SSL VPN security issues and countermeasures [J] Yanbei Normal University, 2007, 23 (2) : 22-26.

Google Scholar

[4] Ren Jiang, Hong-chun Huang on the SSL protocol and its security analysis [J] University of Electronic Science and Technology, 2007, 2 (1) : 55-56.

Google Scholar

[5] Jia-zhen Xu, Zi-meng Chen IPSec-based VPN with SSL-based comparison and analysis [J] Computer Engineering and Design, 2004, 2 (2) : 14-17.

Google Scholar

[6] Qing-ming Jian SSL VPN and its secure remote access application [J] Sichuan Institute of Technology (Natural Science), 2005, 4 (1): 46-49.

Google Scholar

[7] Wei-hua Di SSL VPN Design Technology Information, (2006).

Google Scholar

[8] Jing-li Zhou, Xia Tao SSL VPN-based access mechanism [J] Computer Science, 2005, 5 (1): 23-28.

Google Scholar

[9] ZHAO Qiao-xia, MENG Xiang-ru Design and Simulation of Security Solution for MPLS VPN [J] Journal of Air Force Engineering University(Information Science Edition). 2005, 6(4): 63-66.

Google Scholar

[10] Joshi JBD, Bertino E, Latif U. A Generalized Temporal Role-based Access Control Model [J]. IEEE Trans. On Knowledge and Data Engineering, 2005, 17 (1) : 4-23.

DOI: 10.1109/tkde.2005.1

Google Scholar