Sciweavers

109 search results - page 14 / 22
» Securing Virtual Private Networks with SIM Authentication
Sort
View
HOTOS
2009
IEEE
15 years 3 months ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
15 years 6 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
ITICSE
2009
ACM
15 years 6 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
DANCE
2002
IEEE
15 years 4 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...
ICWS
2004
IEEE
15 years 1 months ago
Managing and Securing Web Services with VPNs
Web Services constitute a set of technologies that many believe will change the web communication landscape within the next few years. They offer standardized and easy communicati...
Lina Alchaal, Vincent Roca, Michel Habert