Sciweavers

1314 search results - page 5 / 263
» New Approaches for Virtual Private Network Design
Sort
View
87
Voted
INFOCOM
2002
IEEE
15 years 2 months ago
Restoration Algorithms for Virtual Private Networks in the Hose Model
—A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of e connected using abstractions such as Virt...
Giuseppe F. Italiano, Rajeev Rastogi, Bülent ...
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 3 months ago
QoS Aware Dynamic Flow Control in Virtual Private Network
— In recent years, IP based Virtual Private Networks (IP-VPNs) which enables enterprises to dynamically create and manage privately owned virtual networks over the public network...
Fariza Sabrina, Glynn Rogers
EUROMICRO
2009
IEEE
15 years 1 months ago
Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes
Cloud computing uses virtualization technologies to offer a non-shared use rental of computer resources with publicly accessible worker nodes. However, unlike Grid computing, Cloud...
Matthias Schmidt, Niels Fallenbeck, Matthew Smith,...
75
Voted
OSDI
2006
ACM
15 years 9 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
75
Voted
ACSAC
2000
IEEE
15 years 1 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...