Sciweavers

62 search results - page 2 / 13
» Integrity for Virtual Private Routed Networks
Sort
View
STOC
2001
ACM
122views Algorithms» more  STOC 2001»
14 years 5 months ago
Provisioning a virtual private network: a network design problem for multicommodity flow
Consider a setting in which a group of nodes, situated in a large underlying network, wishes to reserve bandwidth on which to support communication. Virtual private networks (VPNs...
Anupam Gupta, Jon M. Kleinberg, Amit Kumar, Rajeev...
GI
2001
Springer
13 years 9 months ago
Building ALL-IP Based Virtual Private Networks in Mobile Environment
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...
LCN
2003
IEEE
13 years 10 months ago
Secure and Manageable Virtual Private Networks for End-users
This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environm...
Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu A...
ICWS
2007
IEEE
13 years 6 months ago
Service-Oriented Virtual Private Networks for Grid Applications
Emerging Grid applications desire not only high bandwidth but also the ability to control the topology and traffic engineering of the underlying networks, through web service inte...
Hanxi Zhang, Michel Savoie, Scott Campbell, Sergi ...
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 4 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...