Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Virtual Private Network.

Dissertationen zum Thema „Virtual Private Network“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Virtual Private Network" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Celestino, Pedro. "Private virtual network." Universidade de Taubaté, 2005. http://www.bdtd.unitau.br/tedesimplificado/tde_busca/arquivo.php?codArquivo=264.

Der volle Inhalt der Quelle
Annotation:
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cryptographic algorithms, safe means of communication are essential items so that the information can travel in environmentals free of external interferences. One of the alternatives is the Virtual Private Networks. In this work, the main pro
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Samuelsson, Joakim, and Richard Sandsund. "Implementing a virtual private network." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91933.

Der volle Inhalt der Quelle
Annotation:
Dagens företag vill ge anställda möjlighet att jobba hemifrån eller på resande fot. En vanlig lösning för att möjliggöra detta är virtual private network (VPN). VPN ger en användare tillgång till interna resurser på företaget från ett externt nät, exempelvis via Internet. Detta gör att användare kan komma åt de interna resurserna på ett säkert sätt. Vilken VPN-teknik är då att föredra för att få en så snabb, säker och pålitlig anslutning som möjligt? Detta examensarbete tar upp olika VPN-tekniker. Vi beskriver vanliga VPN-protokoll som L2TP, IPSec och PPTP. Hur användare autentiseras på ett sä
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Davis, Carlton R. "IPSec base virtual private network." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33390.

Der volle Inhalt der Quelle
Annotation:
The Internet evolved from an experiential packet-switching network called the ARPANET. This network has grown exponentially since its conversion from an experimental to an operational network in 1975. However, the need for confidential and secure data channel has dissuaded many enterprises from using this ubiquitous public infrastructure. The IPSec protocol suite developed by the Internet Engineering Task Force (IETF) makes it possible to implement secure communication channels or virtual private network (VPN) over the Internet. Corporations can benefit from substantial financial savings by ut
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Habibovic, Sanel. "VIRTUAL PRIVATE NETWORKS : An Analysis of the Performance in State-of-the-Art Virtual Private Network solutions in Unreliable Network Conditions." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17844.

Der volle Inhalt der Quelle
Annotation:
This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed for a while and the new protocol stirs the pot in the VPN field. Therefore a contemporary comparison between them could aid system administrators when choosing which VPN to implement. To choose the right VPN solution for the occasion could increase per
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Norin, Anders, and Henrik Ohlsson. "VPN : Virtual Private Network i Windows 2000." Thesis, University West, Department of Informatics and Mathematics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-483.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ikiz, Suheyla. "Performance Parameters Of Wireless Virtual Private Network." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607094/index.pdf.

Der volle Inhalt der Quelle
Annotation:
ABSTRACT PERFORMANCE PARAMETERS OF WIRELESS VIRTUAL PRIVATE NETWORK KZ, S&uuml<br>heyla Ms.c, Department of Information Systems Supervisor: Assoc. Prof. Dr. Nazife Baykal Co-Supervisor: Assist. Prof. Dr. Yusuf Murat Erten January 2006, 78 pages As the use of PC&rsquo<br>s and handheld devices increase, it expected that wireless communication would also grow. One of the major concerns in wireless communication is the security. Virtual Private Network (VPN) is the most secure solution that ensures three main aspect of security: authentication, accountability and encryption can use in wireless ne
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Liang, Huan. "Minimal cost design of virtual private network." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26513.

Der volle Inhalt der Quelle
Annotation:
VPN technology is an attractive cost-effective solution for the support of the networking needs of enterprises. In this work, we review current issues in the development of VPN technology. We then focus our research on minimal cost design, used by network-based IP VPN service providers. The interest in such solutions is generated by both customers seeking to reduce support costs and by Internet Service Providers (ISPs) seeking new revenue sources. Solving the cost minimization would allow ISPs to define and deploy new VPN services. In this thesis, Multicommodity Min-Cost Flows (MMCF) formulati
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Rüegg, Maurice. "Virtual private network provisioning in the hose model /." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Institut für Technische Informatik und Kommunikationsnetze, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=119.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lin, Zhangxi. "Virtual private network traffic pricing : an exploratory study /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Bazama, Muneer I. "Investigation into Layer 3 Multicast Virtual Private Network Schemes." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22653.

Der volle Inhalt der Quelle
Annotation:
The need of multicast applications such as Internet Protocol Television (IPTV) and dependent financial services require more scalable and reliable MVPN infrastructures. This diversity and breadth of services pose a challenge for operators to create an infrastructure that supports Layer 2 (ATM/Frame relay/Ethernet/PPP) and Layer 3(IPv4/IPv6) Virtual Private Networks. The difficulty is particularly true for virtual services that require complex control and data plane operations. Another challenge is to support emerging multicast applications incrementally on top of the existing Layer 3 VPN infra
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Ögren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.

Der volle Inhalt der Quelle
Annotation:
Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit. This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The infrastructure in use, as well as the hardware, has to be used without major changes. Since 1998/1999,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Gaspoz, Jean-Paul. "Object-oriented method and architecture for virtual private network service management /." [S.l.] : [s.n.], 1996. http://library.epfl.ch/theses/?nr=1446.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Soler, Avellén Carl Richard. "Virtual Private Network Communication over a session layer socket protocol (SOCKS)." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66277.

Der volle Inhalt der Quelle
Annotation:
SYSTeam is an IT solutions supplier company that wants to develop a product which permits users to communicate with each other, over the Internet, in a secure way. The solution creates communication between two subnets which are connected through a Virtual Private Network (VPN) Gateway. The security of the communication is implemented at the application layer by using the Secure Socket Layer (SSL) protocol which carries, encrypted within it, a session layer technology called Sock-et-s (SOCKS). The communication prototype is developed in a Linux platform with the Integrated Development Environm
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Ng, Walfrey. "MIBlet approach to virtual private network management, design, applications and implementation." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ45994.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Chowdavarapu, Pradeep Kumar, Pramod Kati, and Williams Opoku. "INFORMATION INTERCHANGE IN VIRTUAL PRIVATE NETWORKS : Key Considerations for Efficient Implementation." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20915.

Der volle Inhalt der Quelle
Annotation:
This thesis identifies some key Considerations to be considered to create an efficient virtual private network and also investigates to understand some efficiency problems affecting the interchange of information in such networks. It then outlines some possible solutions to manage such problems.The ICT and the telecommunications have been advancing at a rapid rate. This has been seen in the exchange of information in virtual networks such as the social networks like Facebook, Skype, Google talk, Yahoo messenger, Twitter etc. The need for maximum security, privacy and cost effectiveness in diff
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Liyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.

Der volle Inhalt der Quelle
Annotation:
Abstract Ethernet based VPLS (Virtual Private LAN Service) is a transparent, protocol independent, multipoint L2VPN (Layer 2 Virtual Private Network) mechanism to interconnect remote customer sites over IP (Internet Protocol) or MPLS (Multiprotocol Label Switching) based provider networks. VPLS networks are now becoming attractive in many Enterprise applications, such as DCI (data center interconnect), voice over IP (VoIP) and videoconferencing services due to their simple, protocol-independent and cost efficient operation. However, these new VPLS applications demand additional requirements, s
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Perez, Fridrich Shane. "A Framework for the Performance Analysis and Tuning of Virtual Private Networks." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6867.

Der volle Inhalt der Quelle
Annotation:
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a var
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Ferguson, Jason. "An Examination of a Virtual Private Network Implementation to Support a Teleworking Initiative: The Marcus Food Company Inc. Case Study." NSUWorks, 2010. http://nsuworks.nova.edu/gscis_etd/149.

Der volle Inhalt der Quelle
Annotation:
In this dissertation, the author examined the capabilities of virtual private networks (VPNs) in supporting teleworking environments for small businesses in the food marketing sector. The goal of this research was to develop an implementation model for small businesses in the food marketing sector that use a VPN solution to support teleworker access to corporate resources. The author conducted a case study of the Marcus Food Company (MFC) VPN implementation in conjunction with the system development life cycle (SDLC) methodology to achieve this objective. The SDLC methodology was used to suppo
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Corfiati, Matteo. "Valutazione sperimentale di tecnologie per la creazione di VPN in ambito LAN/WAN." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4548/.

Der volle Inhalt der Quelle
Annotation:
Il documento riporta, con prove sperimentali, un confronto tra le prestazioni che diverse tecnologie VPN hanno all'interno dello scenari wired e wireless. Il protocollo di tunneling utilizzato per la creazione delle VPN incide in modo particolare sulle performance della rete. L'obiettivo è proprio quello di valutare il protocollo che fornisce una qualità migliore a livello prestazionale, il tutto tramite un insieme mirato di test.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Tabassum, Mujahid, and Khamees Elkhateeb. "Network Capability Analysis and Related Implementations Improvements Recommendations." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2476.

Der volle Inhalt der Quelle
Annotation:
<p>The networking field has become a core component for any company. All of the</p><p>businesses rely on the networking industry, due its vastness and significance. Every day</p><p>companies are planning and thinking to develop better strategies that can offer efficient</p><p>and reliable communication solutions between their employees and customers for</p><p>maximum revenue. The planning of a company’s network requires a lot of resources and</p><p>aspects to study, and to evaluate them carefully to build a comprehensive secure and</p><p>reliable platform. It is the job of a network administra
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

SATO, Ken-ichi, Hiroshi HASEGAWA, Yoshiyuki YAMADA, and Fumisato NARUSE. "Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services." 電子情報通信学会, 2012. https://search.ieice.org/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Cote, ̕. Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386706.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, Dec. 2000.<br>Thesis advisors, Rex Buddenberg, Daniel Warren. "December 2000." Includes bibliographical references (p. 81-82). Also available in print.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Cote, Richard Scott. "Implementation considerations for a Virtual Private Network (VPN) to enable broadband secure remote access to the Naval Postgraduate School Intranet." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9179.

Der volle Inhalt der Quelle
Annotation:
As broadband connections to the home become more prevalent, through Digital Subscriber Lines (DSL) and cable modems, students and faculty will desire to access the NPS Internet via these new means instead of their 56K modems. The introduction of these new technologies will require NPS to re- evaluate how to allow remote access to their internal resources in a secure way, while still allowing for the use of broadband technologies. This thesis will examine the alternative methods for implementing VPNs, from simple use of Point to Point Protocols (PPP) to high end specialized internet appliances
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Wagner, Edward Dishman. "Public Key Infrastructure (PKI) And Virtual Private Network (VPN) Compared Using An Utility Function And The Analytic Hierarchy Process (AHP)." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/32685.

Der volle Inhalt der Quelle
Annotation:
This paper compares two technologies, Public Key Infrastructure (PKI) and Virtual Private Network (VPN). PKI and VPN are two approaches currently in use to resolve the problem of securing data in computer networks. Making this comparison difficult is the lack of available data. Additionally, an organization will make their decision based on circumstances unique to their information security needs. Therefore, this paper will illustrate a method using a utility function and the Analytic Hierarchy Process (AHP) to determine which technology is better under a hypothetical set of circumstances.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Kilcrease, Patrick N. "Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKilcrease.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Barreto, Albert. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Virtual Private Network, GHOSTNet, maritime interdiction operations, internet protocol security, encapsulating security protocol, data encryption standard. Includes bibliographical references (p. 83-84). Also available in print.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Goh, Vik Tor. "Intrusion detection framework for encrypted networks." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.

Der volle Inhalt der Quelle
Annotation:
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Våge, William. "Digitala hjälpmedel för aktivitetsbaserat arbetssätt." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-30874.

Der volle Inhalt der Quelle
Annotation:
The activity based workplace model is becoming more and more com- mon and the Swedish Insurance Agency is an authority that has em- braced this model. The new way of working means that more employ- ees work from home or another place than the office. The new working model needs IT solutions that can handle communication and secure document management. This has caused two problems at the Swedish Insurance Agency. The first problem is concerning confusion about how employees should connect correctly to the authority’s conference room equipment. The solution proposal should be able to evaluate if
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Der volle Inhalt der Quelle
Annotation:
<p>In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.</p><p>However, an already developed, well structured and considered security approach – with proper impl
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Castillo, Meza Joel Omar. "Migración e implementación hacia una red MPLS-VPN aplicado a una entidad empresarial en la ciudad de Lima." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1278.

Der volle Inhalt der Quelle
Annotation:
En la presente tesina se realiza una descripción de la tecnología de Conmutación Multi-Protocolo mediante etiquetas usando una red privada virtual para la comunicación de una entidad empresarial. Se realizó una descripción de la tecnología MPLS con VPN mostrando sus cualidades, ventajas y desventajas, se promueve la esta tecnología a la red de comunicación de datos de la empresa tenga un performance y confidencialidad en los datos transmitidos, diseñando un esquema así como la infraestructura que podría ser usada en esta implementación, con características modulares las cuales permitirá a la e
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Harris, B. A. "Firewalls and virtual private networks." Thesis, University of Canterbury. Computer Science, 1998. http://hdl.handle.net/10092/8413.

Der volle Inhalt der Quelle
Annotation:
The Internet has become a global computing phenomenon, and during the 1990's has had more influence on the computer - communications industry than any other development in its history. There are two major issues effecting the development of the Internet for the 21st century; performance and security. This thesis is concerned with the later; in particular the issues raised by the interconnection of TCP/IP based networks between trusted and untrusted network domains. Four main topics are addressed: the common threats and vulnerabilities that effect the TCP/IP protocol suite at the Network, Tran
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Lukaszewski, Daniel. "Multipath transport for virtual private networks." Thesis, Monterey, California: Naval Postgraduate School, 2017. http://hdl.handle.net/10945/53013.

Der volle Inhalt der Quelle
Annotation:
Approved for public release; distribution is unlimited<br>Virtual Private Networks (VPNs) are designed to use the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to establish secure communication tunnels over public Internet. Multipath TCP (MPTCP) extends TCP to allow data to be delivered over multiple network paths simultaneously. This thesis first builds a testbed and investigates the potential of using MPTCP tunnels to increase the goodput of VPN communications and support seamless mobility. Based on the empirical results and an analysis of the MPTCP design in Linux kern
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Космина, Андрій Сергійович, та Andrii Kosmyna. "Дослідження відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес-процесів". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36800.

Der volle Inhalt der Quelle
Annotation:
Дослідження відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес-процесів// Дипломна робота ОР «Магістр» // Космина Андрій Сергійович // Тернопільський національний технічний університет імені Івана Пулюя, факультет комп’ютерно-інформаційних систем і програмної інженерії, кафедра кібербезпеки, група СБмз-61 // Тернопіль, 2021 // С. 75 , рис. – 14 , табл. – 3 , додат. – 5<br>Дана магістерська кваліфікаційна робота присвячена дослідженню відмовостійкості з'єднання OpenVPN для забезпечення неперервності бізнес- процесів. Проведено аналіз видів VPN та їх використання для
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Bergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.

Der volle Inhalt der Quelle
Annotation:
This project is about how free, open-source tools can create reasonable, secure and flexible remote access solutions for smaller companies with a limited budget.  Secure remote access to a working environment is a solution for its time, as last year Covid-19 change the working environment for millions of employers and employees. The importance of secure remote access to a working environment became noticeable as offices closed down and employers started working from home. Still, the need for secure access to the company's infrastructure remains. This is where Virtual Private Networks (VPNs) en
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Sirisukha, Sid. "Protecting management information systems virtual private network competitive advantage : a thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment for the degree of doctor of philosophy, 2007." Click here to access this resource online, 2007. http://aut.researchgateway.ac.nz/handle/10292/324.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Evlogimenou, Anna. "Programmable accounting management for Virtual Private Networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ62962.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Balasubramanian, Ashok. "Protected virtual private networks in the hose model." Thesis, University of Hawaii at Manoa, 2003. http://hdl.handle.net/10125/7018.

Der volle Inhalt der Quelle
Annotation:
A Virtual Private Network (VPN) is a service by a Telecommunication (TSP) or Internet Service Provider (ISP) to emulate a private network for a customer. The hose model is for VPNs where the customer is not required to know the exact pair wise traffic pattern between VPN sites, but specifies the maximum traffic rate that can originate or terminate at each VPN site. Hose VPNs protected from single link failures are considered. Two strategies for protection - Path and Line are described, and mixed integer linear programming problems (MILP) are formulated to determine the bandwidth requirements o
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Flodin, Carl, and Pontus Lantz. "Studenters användning och syn på Virtual Private Networks." Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-414714.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Ben, Houidi Zied. "Scalable routing in provider provisoned virtual private networks." Paris 6, 2010. http://www.theses.fr/2010PA066611.

Der volle Inhalt der Quelle
Annotation:
Les entreprises ont souvent des sites dispersés dans des endroits éloignés et qui ont besoin de communiquer. Au lieu de construire leur propre infrastructure de communication, la plupart des entreprises aujourd'hui, préfèrent acheter un service de réseau privé virtuel (VPN) à un fournisseur de services. Le fournisseur de service VPN est responsable de réaliser le routage afin d'interconnecter les différents sites des entreprises. Dans cette thèse, on fait d'abord un effort pour unifier la vision du routage dans les réseaux privés virtuels fournis par un opérateur. En particulier, on s'intéress
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939092.

Der volle Inhalt der Quelle
Annotation:
During 2012, the global mobile traffic represented 70\% more than 2011. The arrival of the 4G technology introduced 19 times more traffic than non-4G sessions, and in 2013 the number of mobile-connected to the Internet exceeded the number of human beings on earth. This scenario introduces great pressure towards the Internet service providers (ISPs), which are called to ensure access to the network and maintain its QoS. At short/middle term, operators will relay on alternative access networks in order to maintain the same performance characteristics. Thus, the traffic of the clients might be of
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Jia, Yuxiao. "Dynamic quality of service support in virtual private networks." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/26667.

Der volle Inhalt der Quelle
Annotation:
This thesis presents a framework for the provision of dynamic Quality of Service (QoS) support in Virtual Private Networks (VPNs). Specifically, we focus on MPLS based VPN, with the QoS components including use of MPLS Diffserv, MPLS Traffic Engineering, RSVP-TE signaling protocol etc. The framework consists of a Dynamic Bandwidth Allocation model that includes traffic estimators and the development of a resource reservation technique. The Dynamic Bandwidth Allocation (DBA) uses traffic estimators whose outputs are used for the reservation of resource within some time duration in the future. T
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Sherry, Zaida. "Governance of virtual private networks using COBIT as framework." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.

Der volle Inhalt der Quelle
Annotation:
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007.<br>The purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These r
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Elis, Martin. "Datově úsporné zabezpečení cloudových úložišť." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242018.

Der volle Inhalt der Quelle
Annotation:
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own desig
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Isaacs, Rebecca. "Dynamic provisioning of resource-assured and programmable virtual private networks." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621158.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Rosenbaum, Gustav Filip Computer Science &amp Engineering Faculty of Engineering UNSW. "Providing resilient quality of service connections in provider-based virtual private networks." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2005. http://handle.unsw.edu.au/1959.4/25989.

Der volle Inhalt der Quelle
Annotation:
This thesis focuses on efficient provisioning of resilient Virtual Private Network (VPN) services. It first confirms the intuition that network resources can be more efficiently utilized when resilience mechanisms are implemented by a network provider in the physical network than by its VPN customers in their VPNs. Next, a Multiprotocol Label Switching-based programmable VPN architecture is presented that delivers virtual links as resilient quality of service (QoS) connections and virtual sites. Virtual sites allow customers to implement functionality like customized routing and content adapta
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Tryggvason, Thorir. "Analysis of the PPTP and IPSec protocols in Virtual Private Networks." Thesis, University of Skövde, Department of Computer Science, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-415.

Der volle Inhalt der Quelle
Annotation:
<p>Today increasing numbers of individuals are working away from the ordinary workplace while still requiring access to the server located at the workplace. New technology is meeting this demand allowing for safe and secure transmission of the data over the Internet. The aim of this project is to analyse two protocols that are used within the Virtual Private Network (VPN) structure today, with the focus on installation, transmission speed on both Local Area Networks (LAN) and via telephone line and security aspects of the protocols.</p><p>The results show that it is quite complicated to setup
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Valella, William. "Securing open source Virtual Private Networks a study in Linux security /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000362.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S.)--University of Florida, 2001.<br>Title from title page of source document. Document formatted into pages; contains x, 188 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Janeček, Vít. "Modul rozšiřující funkcionalitu GDPR řešení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385988.

Der volle Inhalt der Quelle
Annotation:
The goal of this thesis is to introduced the principles of access control technologies, the General Data Protection Regulation and the software for data leakage protection. An essential part of the work is a draft and implementation of the expansion module for user device authentication including shared storage access authorization. Therefore, this module allows to verify whether a user can access shared corporate resources. It also allows to enable or disable access based on specified attributes, such as the type of the protected service or user permission. The basic verification of the modul
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Wikström, Alexander, Mark Thomson, and Lolita Mageramova. "Virtual Private Networks: : A feasibility study of secure communications between remote locations." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24550.

Der volle Inhalt der Quelle
Annotation:
Virtual Private Networks (VPNs) are an integral part of protecting company communications from unauthorized viewing, replication or manipulation. In order for employees to remotely conduct business in an effective and secure manner from a branch location or while traveling, Virtual Private Networks can be viewed as an absolute necessity.   Starting with a certain set of network communication requirements, our project's hypothesis was that the most suitable VPN implementation for Cheap Flats (a fictitious company we created) would be an IPSec client VPN. Included in the report are basic definit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Ballapuram, Vijayanand Sreenivasan. "Impact of Queuing Schemes and VPN on the Performance of a Land Mobile Radio VoIP System." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/33033.

Der volle Inhalt der Quelle
Annotation:
Land mobile radio (LMR) systems are used for communication by public safety and other government and commercial organizations. LMR systems offer mission-critical or even life-critical service in the day-to-day activities of such organizations. Traditionally, a variety of different LMR systems have been deployed by different organizations, leading to a lack of radio interoperability. A voice application that connects LMR systems via a packet-switched network is called an LMR Voice over IP (LMRVoIP) system and is a potential solution to the interoperability problem. LMRVoIP systems are time
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0025.

Der volle Inhalt der Quelle
Annotation:
En 2012, le trafic mobile mondial représentait 70% de plus qu'en 2011. L'arrivée de la technologie 4G a multiplié par 19 le volume de trafic non 4G, et en 2013 le nombre de mobiles connectés à l'Internet a dépassé le nombre d'êtres humains sur la planète. Les fournisseurs d'accès Internet (FAI) subissent une forte pression, car ils ont pour obligations d'assurer à leurs clients l'accès au réseau et le maintien de la qualité de service. À court/moyen terme, les opérateurs doivent délester une partie de leur trafic sur des réseaux d'accès alternatifs afin de maintenir les mêmes caractéristiques
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!