[1]
Dai Zongkun Tang Sanping. VPN and network security [M]. Beijing: Electronic Industry Press, 2006: 4-6, 143.
Google Scholar
[2]
the high sea and Britain. VPN technology [M]. Beijing: Mechanical Industry Press, 2005: 8-12, 34.
Google Scholar
[3]
[U.S. ] Paul T. Ammann Xu six-way. Manage dynamic IP network (Chinese version) [M]. Beijing: Tsinghua University Press, 2004: 563.
Google Scholar
[4]
WANG Da. Virtual Private Network (VPN) fine solution. [M]. Beijing: Tsinghua University Press, 2007: 12-43.
Google Scholar
[5]
Jia-zhen Xu, Zi-meng Chen IPSec-based VPN with SSL-based comparison and analysis [J] Computer Engineering and Design, 2004, 2 (2) : 14-17.
Google Scholar
[6]
Qing-ming Jian SSL VPN and its secure remote access application [J] Sichuan Institute of Technology (Natural Science), 2005, 4 (1): 46-49.
Google Scholar
[7]
Carlton R. Davis Zhou Yongbin. IPSec: VPN security implementation. [M]. Tsinghua University Press, 2002: 11-12.
Google Scholar
[8]
Casey Wilson. Virtual Private Network creation and implementation. [M]. Machine Press, 2007: 19-28.
Google Scholar
[9]
Steven Brown. Build a virtual private network. [M]. People Post Press, 2007: 22-34.
Google Scholar
[10]
Sun-bo Xiang SSL VPN security analysis [J] Chengde Petroleum College, 2009, 11 (1) : 12-16.
Google Scholar
[11]
Joshi JBD, Bertino E, Latif U. A Generalized Temporal Role-based Access Control Model [J]. IEEE Trans. On Knowledge and Data Engineering, 2005, 17 (1) : 4-23.
DOI: 10.1109/tkde.2005.1
Google Scholar
[12]
Yuan Jue. King can. Cao Xiaomei. IPSec VPN application protocol. [M]. Computer Applications 2002-05.
Google Scholar
[13]
Hongbo. VPN tunnel Technical Analysis Computer and Information Technology [J] 2002-03: 33-36.
Google Scholar
[14]
He Chaoxi. SINFOR Technology Senior Software Engineer DB (DB / OL) http: /www. vpn. com. cn 2001-11 http: /www. vpn. com. cn 2001-11.
Google Scholar
[15]
Peterson, R., Interconectiong: Bridges and Routers, Ed. Addison-Wesley, 2000. Machinery Industry Press copy edition, (2004).
Google Scholar