VPN Security Technology Theory Modeling and Simulation

Article Preview

Abstract:

In order to authenticate users and to strictly control the only authorized users can access VPN address and biling functions to provide audit expenses such problems, the paper established a theoretical model of VPN security technologies, the use of OPNET simulation tool for safety and technical performance of the VPN the simulation results of VPN security professionals with practical reference value.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1114-1119

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Dai Zongkun Tang Sanping. VPN and network security [M]. Beijing: Electronic Industry Press, 2006: 4-6, 143.

Google Scholar

[2] the high sea and Britain. VPN technology [M]. Beijing: Mechanical Industry Press, 2005: 8-12, 34.

Google Scholar

[3] [U.S. ] Paul T. Ammann Xu six-way. Manage dynamic IP network (Chinese version) [M]. Beijing: Tsinghua University Press, 2004: 563.

Google Scholar

[4] WANG Da. Virtual Private Network (VPN) fine solution. [M]. Beijing: Tsinghua University Press, 2007: 12-43.

Google Scholar

[5] Jia-zhen Xu, Zi-meng Chen IPSec-based VPN with SSL-based comparison and analysis [J] Computer Engineering and Design, 2004, 2 (2) : 14-17.

Google Scholar

[6] Qing-ming Jian SSL VPN and its secure remote access application [J] Sichuan Institute of Technology (Natural Science), 2005, 4 (1): 46-49.

Google Scholar

[7] Carlton R. Davis Zhou Yongbin. IPSec: VPN security implementation. [M]. Tsinghua University Press, 2002: 11-12.

Google Scholar

[8] Casey Wilson. Virtual Private Network creation and implementation. [M]. Machine Press, 2007: 19-28.

Google Scholar

[9] Steven Brown. Build a virtual private network. [M]. People Post Press, 2007: 22-34.

Google Scholar

[10] Sun-bo Xiang SSL VPN security analysis [J] Chengde Petroleum College, 2009, 11 (1) : 12-16.

Google Scholar

[11] Joshi JBD, Bertino E, Latif U. A Generalized Temporal Role-based Access Control Model [J]. IEEE Trans. On Knowledge and Data Engineering, 2005, 17 (1) : 4-23.

DOI: 10.1109/tkde.2005.1

Google Scholar

[12] Yuan Jue. King can. Cao Xiaomei. IPSec VPN application protocol. [M]. Computer Applications 2002-05.

Google Scholar

[13] Hongbo. VPN tunnel Technical Analysis Computer and Information Technology [J] 2002-03: 33-36.

Google Scholar

[14] He Chaoxi. SINFOR Technology Senior Software Engineer DB (DB / OL) http: /www. vpn. com. cn 2001-11 http: /www. vpn. com. cn 2001-11.

Google Scholar

[15] Peterson, R., Interconectiong: Bridges and Routers, Ed. Addison-Wesley, 2000. Machinery Industry Press copy edition, (2004).

Google Scholar