Academic literature on the topic 'VPN management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'VPN management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "VPN management"

1

Liu, Zai Ying, Ping Yang, and Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms." Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.

Full text
Abstract:
VPN based on the internet can not only make some enterprises save a large amount of costs, but also has better scalability, security and reliability. The paper introduced the concept and classifications of VPN, and described the key technologies of IPsec VPN and MPLS VPN. At last, we put the emphasis on the VPN network management mechanism, including fault management, performance management and tunnel management.
APA, Harvard, Vancouver, ISO, and other styles
2

Hudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (July 1, 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.

Full text
Abstract:
The VPN technology is used to connect client devices securely over unsecured public networks. The Connection handover and Dead Peer Detection (DPD) are the most challenging and important tasks in VPN. In this present article, a solution for connection handover is proposed which covers the pre-authentication with new credentials for a mobile device prior to connection handover. In VPN, a case where such connection handover is failed due to incomplete connection handover or several unusual events which make a VPN client to become offline or dead. To address DPD issues a solution is proposed which includes a Keep Alive Timer (KAT) server at the VPN server side. This proposed solution for DPD is far better than an already existing solution that uses a DNS server for DPD since the DNS server faces several attacks consistently. Thus, the proposed solution for DPD is more secure against such vulnerable attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

Hidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (December 7, 2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.

Full text
Abstract:
Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distribution for connections between branches using VPN, c) the creation of a VPN account management function for connection between branch BMT office. Mentari East Lampung, d) has successfully tested the VPN account login from the Client side.
APA, Harvard, Vancouver, ISO, and other styles
4

Alashi, Shahad A., and Hanaa A. Aldahawi. "Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 20, 2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.

Full text
Abstract:
By using the research process, this study addresses the attitudes of the members of Saudi society towards using Virtual Private Network (VPN) applications and the former’s perceptions of the latter’s concept, security, and privacy, in addition to monitoring their risks to cybersecurity. The main objective of the study is to present a proposed framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia to strengthen cybersecurity management. To achieve the objectives of the study, the researchers used two methods: the social survey method and the content analysis method. The researchers also relied on the questionnaire tool to collect information from the 455 individuals in the study sample. The study yielded a set of findings, the most important of which are as follows: The use of free VPN applications represents 91% of the sample of the study. Also, the study revealed confusion in perceptions of the actual concept of VPN applications, which may be common among users, and showed a diversity of attitudes and motives for using VPN applications, most of which are related to entertainment. Moreover, the study showed that the study sample individuals had some knowledge about the risks of VPN applications to cybersecurity, although most of them did not use cyber protection means. The study recommended the need to organize and manage the use of VPN applications, conduct an evaluation of VPN applications available on Saudi smartphone stores, and prohibit those which contain security vulnerabilities and malware. The study proposed a framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia, which comprised three dimensions: legal, organizational and awareness-based dimensions.
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Qiang, and Hua Long Liu. "RFID Network and its Application in Management of Aviation Maintenance." Applied Mechanics and Materials 475-476 (December 2013): 920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.920.

Full text
Abstract:
According to the existing status of civil aviation enterprises office network, this paper brings up a project to combined RFID and the VPN network which have been provided by the original system, by adding a RFID server. It bases on VPN technology to form a RFID intelligent aviation material management information system, without affecting the function of the original office network. The system is able to locate the material position in the warehouse and improve the level of the management on civil aviation material information.
APA, Harvard, Vancouver, ISO, and other styles
6

Salman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator. The testing, verification analyzing of data packets of the network is done using both PING tool and Wireshark.
APA, Harvard, Vancouver, ISO, and other styles
7

Gaspoz, Jean-Paul, Jean-Pierre Hubaux, and Simon Znaty. "A generic architecture for VPN configuration management." Journal of Network and Systems Management 4, no. 4 (December 1996): 375–95. http://dx.doi.org/10.1007/bf02283161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 2 (June 9, 2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.

Full text
Abstract:
Paper ini membahas tentang pembuatan server untuk penyimpanan data menggunakan sistem operasi Freenas, yang pengaksesan servernya melalui jaringan internet atau ip public menggunakan jalur VPN (Virtual Private Network). Akses data dari user ke server menggunakan authentikasi user Freenas dan ditambah dengan authentikasi user VPN untuk menambah keamanan jaringan dan mengatasi masalah keamanan dalam transaksi data seperti pencurian data. Hasil penelitian dari server yang dibuat, menunjukkan bahwa jalur VPN yang dibuat dapat dipakai untuk mengatasi masalah keamanan tersebut. Dari percobaan transaksi data yang sudah dilakukan pada server, menunjukkan bahwa data yang dikirim melalui jaringan internet tanpa VPN tidak terenkripsi dan masih bisa dilihat isinya, sedangkan data yang menggunakan jalur VPN, datanya telah terenkripsi dan tidak bisa dilihat isinya secara langsung.
APA, Harvard, Vancouver, ISO, and other styles
9

Damasco Jr., Loreto B., Noel Raymund F. Lacson, and Roger T. Intong. "Safeguarding Transactional Data: A Comprehensive Investigation of VPN Integration in Point-of-Sale Systems for Enhanced Security and Connectivity." Eximia 12 (December 14, 2023): 570–89. http://dx.doi.org/10.47577/eximia.v12i1.405.

Full text
Abstract:
The integration of Virtual Private Network (VPN) technology into Point-of-Sale (POS) systems has emerged as a solution for securing transactional data in businesses. This study investigates the implementation of a VPN server to address security and connectivity challenges faced by the University of St. La Salle (USLS) Bookstore. The research delves into VPN policy frameworks, assessing the scope and binding, authentication methods, and VPN credentials and security protocols. The system design employs a combination of conceptual models and activity diagrams to illustrate the process of user authentication and data encryption. Furthermore, the study evaluates the system's performance in terms of scalability, efficiency, and effectiveness in ensuring authentication and security. The deployment of the VPN infrastructure involves the installation of requisite software and hardware components, along with rigorous testing procedures to assess system performance and reliability. The findings highlight the significance of VPN in safeguarding sensitive transaction data and enhancing the efficiency of POS operations. The study's outcomes offer valuable insights into the effective implementation and management of VPN technology for securing business operations.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Guo Fang. "The Solution and Management of VPN Based IPSec Technology." Applied Mechanics and Materials 686 (October 2014): 210–19. http://dx.doi.org/10.4028/www.scientific.net/amm.686.210.

Full text
Abstract:
The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. If a secure connection is necessary then a virtual private network (VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site-to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "VPN management"

1

Dahlberg, Axel, and Jonas Francén. "IPv6-adresshantering och prefixdelegering i MPLS VPN-nät." Thesis, KTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123805.

Full text
Abstract:
För full migrering till IPv6 behöver utbudet av datakommuniktionsstjänster anpassas för den nyagenerationens IP-protokoll med bevarad eller utökad funktionalitet. Detta examensarbetes mål äratt ta fram en eller flera lösningar som möter krav och tekniska förutsättningar för att utöka företagetDGC:s tjänst IP-VPN för IPv6. Detta innefattar adresstilldelningstekniker som prefixdelegeringoch automatisk adresskonfigurering i befintlig nätinfrastruktur.Lösningarna presenteras i sex framtagna scenarier som har undersökts utifrån tester, analys ocherfarna problem som uppstått. Undersökningen formade kriterierna skalbarhet, konfigurationenskomplexitet, kompatibilitet, RFC-stöd och krav från DGC som tas hänsyn till i utvärderingen avden bäst lämpade lösningen.Utvärderingen har gett ett resultat i form av ett rekommenderat scenario som är implementerbartenligt uppsatta mål.Tekniker som skulle kunna påverka valet av bäst lämpade lösning, men som inte är tillgängliga,diskuteras och presenteras för att poängtera vad som kan behövas tas i beaktande för framtiden.
Full migration to IPv6 brings the need to adjust datacommunication services for the new generationof IP protocols with maintained or expanded functionality. This thesis’ goals is to submitone or more solutions that meets requirements and the technical conditions that enables thecompany DGC:s to expand the service IP-VPN for IPv6. This includes address assignmenttechniques like prefix delegation and automatic address configuration in existing network infrastructure.Solutions are presented in six scenarios that have been investigated considering tests, analysis andexperienced problems. The investigation formed the criteria scalability, configuration complexity,compatibility, support by RFC:s and requirements stated by DGC that adds to the evaluationof the most suitable solution.The evaluation has resulted in a recommended scenario that is implementable according to givengoals.Techniques that may influence the choice of most suitable solution, but that is not yet available,are discussed and presented to point out what may needed to be considered in the future.
APA, Harvard, Vancouver, ISO, and other styles
2

Salha, Guillaume. "Management des systèmes d'information et télécommunications." Perpignan, 2006. http://www.theses.fr/2006PERP0712.

Full text
Abstract:
Le sujet traite du Management des Systèmes d'Informations et de Télécommunications, dans un monde interconnecté où la révolution des nouvelles technologies de communication impacte les entreprises et induit à des changements dans leur fonctionnement et leur organisation. Afin de répondre à ce besoin économique, je propose une description détaillée des différentes topologies en matière d'interconnections et de sécurité permettant de traiter la modélisation des systèmes informatiques , d'étudier le comportement des systèmes sur des modèles et non sur le système lui-même. Je présenterai notamment une solution innovante que j'ai conçue, basée sur le concept de télécollecte IP et Routage Multi opérateur basé sur la technologie de collecte XDSL d'opérateur d'infrastructure routeur en cœur de réseau sur un site centralisé, ainsi que la démarche projet à suivre dans le cadre de la mise en place du système d'information par une méthodologie destinée à fournir un cadre commun couvrant la maîtrise des processus fondamentaux et leurs impacts organisationnels et techniques sur le déploiement en entreprise
The subject concerns the management of the Information systems and Telecommunications. I propose a detailed description of various topologies of inter-connection and security. I propose a modelisation of the information processing systems, to study the behavior of the systems on models and not on the system itself. I present an innovating solution based on the concept of IP collect and Multi operator routing, using the XDSL technologies of infrastructure operators, to the router in a centralized site. I propose project guidelines and methodology intended to provide a common framework covering the control of the fundamental processes and their organizational and technical impacts on the deployment in companies
APA, Harvard, Vancouver, ISO, and other styles
3

Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939092.

Full text
Abstract:
During 2012, the global mobile traffic represented 70\% more than 2011. The arrival of the 4G technology introduced 19 times more traffic than non-4G sessions, and in 2013 the number of mobile-connected to the Internet exceeded the number of human beings on earth. This scenario introduces great pressure towards the Internet service providers (ISPs), which are called to ensure access to the network and maintain its QoS. At short/middle term, operators will relay on alternative access networks in order to maintain the same performance characteristics. Thus, the traffic of the clients might be offloaded from RANs to some other available access networks. However, the same security level is not ensured by those wireless access networks. Femtocells, WiFi or WiMAX (among other wireless technologies), must rely on some mechanism to secure the communications and avoid untrusted environments. Operators are mainly using IPsec to extend a security domain over untrusted networks. This introduces new challenges in terms of performance and connectivity for IPsec. This thesis concentrates on the study of the mechanism considering improving the IPsec protocol in terms of continuity of service. The continuity of service, also known as resilience, becomes crucial when offloading the traffic from RANs to other access networks. This is why we first concentrate our effort in defining the protocols ensuring an IP communication: IKEv2 and IPsec. Then, we present a detailed study of the parameters needed to keep a VPN session alive, and we demonstrate that it is possible to dynamically manage a VPN session between different gateways. Some of the reasons that justify the management of VPN sessions is to provide high availability, load sharing or load balancing features for IPsec connections. These mechanisms increase the continuity of service of IPsec-based communication. For example, if for some reason a failure occurs to a security gateway, the ISP should be able to overcome this situation and to provide mechanisms to ensure continuity of service to its clients. Some new mechanisms have recently been implemented to provide High Availability over IPsec. The open source VPN project, StrongSwan, implemented a mechanism called ClusterIP in order to create a cluster of IPsec gateways. We merged ClusterIP with our own developments in order to define two architectures: High Availability and Context Management over Mono-LAN and Multi-LAN environments. We called Mono-LAN those architectures where the cluster of security gateways is configured under a single IP address, whereas Multi-LAN concerns those architectures where different security gateways are configured with different IP addresses. Performance measurements throughout the thesis show that transferring a VPN session between different gateways avoids re-authentication delays and reduce the amount of CPU consumption and calculation of cryptographic material. From an ISP point of view, this could be used to avoid overloaded gateways, redistribution of the load, better network performances, improvements of the QoS, etc. The idea is to allow a peer to enjoy the continuity of a service while maintaining the same security level that it was initially proposed
APA, Harvard, Vancouver, ISO, and other styles
4

Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0025.

Full text
Abstract:
En 2012, le trafic mobile mondial représentait 70% de plus qu'en 2011. L'arrivée de la technologie 4G a multiplié par 19 le volume de trafic non 4G, et en 2013 le nombre de mobiles connectés à l'Internet a dépassé le nombre d'êtres humains sur la planète. Les fournisseurs d'accès Internet (FAI) subissent une forte pression, car ils ont pour obligations d'assurer à leurs clients l'accès au réseau et le maintien de la qualité de service. À court/moyen terme, les opérateurs doivent délester une partie de leur trafic sur des réseaux d'accès alternatifs afin de maintenir les mêmes caractéristiques de performances. Ainsi, pour désengorger les réseaux d'accès radio (RAN), le trafic des clients peut être préférentiellement pris en charge par d'autres réseaux d'accès disponibles. Notons cependant que les réseaux d'accès sans fil offrent des niveaux de sécurité très différents. Pour les femtocells, WiFi ou WiMAX (parmi d'autres technologies sans fil), il doit être prévu des mécanismes permettant de sécuriser les communications. Les opérateurs peuvent s'appuyer sur des protocoles (tels que IPsec) afin d'étendre un domaine de sécurité sur des réseaux non sécurisés. Cela introduit de nouveaux défis en termes de performances et de connectivité pour IPsec. Cette thèse se concentre sur l'étude des mécanismes permettant de garantir et améliorer les performances du protocole IPsec en termes de continuité de service. La continuité de service, aussi connu comme résilience, devient cruciale lorsque le trafic mobile est dévié depuis un réseau d'accès RAN vers d'autres réseaux d'accès alternatifs. C'est pourquoi nous nous concentrons d'abord dans l'ensemble de protocoles assurant une communication IP: IKEv2 et IPsec. Ensuite, nous présentons une étude détaillée des paramètres nécessaires pour maintenir une session VPN, et nous démontrons qu'il est possible de gérer dynamiquement une session VPN entre différentes passerelles de sécurité. L'une des raisons qui justifient la gestion des sessions VPN est d'offrir de la haute disponibilité, le partage de charge ou l'équilibrage de charge pour les connexions IPsec. Ces mécanismes ont pour finalité d'augmenter la continuité de service de sessions IPsec. Certains nouveaux mécanismes ont été récemment mis en oeuvre pour assurer la haute disponibilité sur IPsec. Le projet open source VPN, StrongSwan, a mis en place un mécanisme appelé ClusterIP afin de créer un cluster de passerelles IPsec. Nous avons fusionné cette solution basée sur ClusterIP avec nos propres développements afin de définir deux architectures : une architecture permettant la Haute Disponibilité et une deuxième architecture présentant la gestion dynamique d'un contexte IPsec. Nous avons défini deux environnements : le Mono-LAN où un cluster de noeuds est configuré sous une même adresse IP unique, et le Multi-LAN où chaque passerelle de sécurité dispose d'une adresse IP différente. Les mesures de performance tout au long de la thèse montrent que le transfert d'une session VPN entre différentes passerelles évite les délais supplémentaires liés à la ré-authentification et réduit la consommation CPU, ainsi que les calculs par le matériel cryptographique. D'un point de vue FAI, le transfert de contexte IPsec/IKEv2 pourrait être utilisé pour éviter la surcharge des passerelles, et permettre la redistribution de la charge, de meilleures performances du réseau ainsi que l'amélioration de la qualité de service. L'idée est de permettre à un utilisateur de profiter de la continuité d'un service tout en conservant le même niveau de sécurité que celui initialement proposé
During 2012, the global mobile traffic represented 70\% more than 2011. The arrival of the 4G technology introduced 19 times more traffic than non-4G sessions, and in 2013 the number of mobile-connected to the Internet exceeded the number of human beings on earth. This scenario introduces great pressure towards the Internet service providers (ISPs), which are called to ensure access to the network and maintain its QoS. At short/middle term, operators will relay on alternative access networks in order to maintain the same performance characteristics. Thus, the traffic of the clients might be offloaded from RANs to some other available access networks. However, the same security level is not ensured by those wireless access networks. Femtocells, WiFi or WiMAX (among other wireless technologies), must rely on some mechanism to secure the communications and avoid untrusted environments. Operators are mainly using IPsec to extend a security domain over untrusted networks. This introduces new challenges in terms of performance and connectivity for IPsec. This thesis concentrates on the study of the mechanism considering improving the IPsec protocol in terms of continuity of service. The continuity of service, also known as resilience, becomes crucial when offloading the traffic from RANs to other access networks. This is why we first concentrate our effort in defining the protocols ensuring an IP communication: IKEv2 and IPsec. Then, we present a detailed study of the parameters needed to keep a VPN session alive, and we demonstrate that it is possible to dynamically manage a VPN session between different gateways. Some of the reasons that justify the management of VPN sessions is to provide high availability, load sharing or load balancing features for IPsec connections. These mechanisms increase the continuity of service of IPsec-based communication. For example, if for some reason a failure occurs to a security gateway, the ISP should be able to overcome this situation and to provide mechanisms to ensure continuity of service to its clients. Some new mechanisms have recently been implemented to provide High Availability over IPsec. The open source VPN project, StrongSwan, implemented a mechanism called ClusterIP in order to create a cluster of IPsec gateways. We merged ClusterIP with our own developments in order to define two architectures: High Availability and Context Management over Mono-LAN and Multi-LAN environments. We called Mono-LAN those architectures where the cluster of security gateways is configured under a single IP address, whereas Multi-LAN concerns those architectures where different security gateways are configured with different IP addresses. Performance measurements throughout the thesis show that transferring a VPN session between different gateways avoids re-authentication delays and reduce the amount of CPU consumption and calculation of cryptographic material. From an ISP point of view, this could be used to avoid overloaded gateways, redistribution of the load, better network performances, improvements of the QoS, etc. The idea is to allow a peer to enjoy the continuity of a service while maintaining the same security level that it was initially proposed
APA, Harvard, Vancouver, ISO, and other styles
5

Hümmer, Bernd. "Strategisches Management von Kernkompetenzen im Hyperwettbewerb : Operationalisierung kernkompetenzorientierten Managements für dynamische Umfeldbedingungen /." Wiesbaden : Wiesbaden : Deutscher Universitäts-Verlag ; Gabler, 2001. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009424527&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Husen, Christian van [Verfasser]. "Anforderungsanalyse für produktbegleitende Dienstleistungen / vorgelegt von Christian van Husen." Heimsheim : Jost-Jetter, 2007. http://d-nb.info/994963432/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

[Verfasser]. "Anforderungsanalyse für produktbegleitende Dienstleistungen / vorgelegt von Christian van Husen." Heimsheim : Jost-Jetter, 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-31920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Keuken, Friedhelm. "Management von Akademikerorganisationen /." Hamburg : Kovač, 1996. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=007232128&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fankhauser, Kathrin. "Management von Organisationskulturen /." Bern ; Stuttgart ; Wien : Haupt, 1996. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=007199997&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zagler, Michael. "Management von Einkaufssynergien /." [S.l. : s.n.], 2003. http://www.gbv.de/dms/zbw/373225024.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "VPN management"

1

Peter, Giannoulis, and Hay Keli, eds. Nokia firewall, VPN, and IPSO configuration guide. Burlington, MA: Syngress Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bellabarba, Alexander, Phillipp Radtke, and Dirk Wilmes. Management von Kundenbeziehungen. München: Carl Hanser Verlag GmbH & Co. KG, 2002. http://dx.doi.org/10.3139/9783446226616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blumberg, Boris. Management von Technologiekooperationen. Wiesbaden: Deutscher Universitätsverlag, 1998. http://dx.doi.org/10.1007/978-3-663-08122-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stoyan, Robert, ed. Management von Webprojekten. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71195-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Odenthal, Stefan. Management von Unternehmungsteilungen. Wiesbaden: Deutscher Universitätsverlag, 1999. http://dx.doi.org/10.1007/978-3-322-97794-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gemünden, Hans Georg, and Martin Högl, eds. Management von Teams. Wiesbaden: Gabler Verlag, 2001. http://dx.doi.org/10.1007/978-3-322-82920-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eller, Roland, Markus Heinrich, René Perrot, and Markus Reif, eds. Management von Rohstoffrisiken. Wiesbaden: Gabler, 2010. http://dx.doi.org/10.1007/978-3-8349-8562-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sydow, Jörg, ed. Management von Netzwerkorganisationen. Wiesbaden: Gabler Verlag, 2010. http://dx.doi.org/10.1007/978-3-8349-8593-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hofer, Adrian P. Management von Produktfamilien. Wiesbaden: Deutscher Universitätsverlag, 2001. http://dx.doi.org/10.1007/978-3-663-07940-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schreiber, Daniel. Management von Controllingwissen. Wiesbaden: Gabler, 2010. http://dx.doi.org/10.1007/978-3-8349-8623-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "VPN management"

1

Alharbi, Adel, Ayoub Bahnasse, Mohamed Talea, Hafsa Ait Oulahyane, and Fatima Ezzahraa Louhab. "Smart SDN Policy Management Based VPN Multipoint." In Advances in Intelligent Systems and Computing, 250–63. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91337-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chan, M. C., A. A. Lazar, and R. Stadler. "Customer Management and Control of Broadband VPN Services." In Integrated Network Management V, 301–14. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35180-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saydam, T., J. P. Gaspoz, P. A. Etique, and J. P. Hubaux. "Object-oriented design of a VPN bandwidth management system." In Integrated Network Management IV, 344–55. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34890-2_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ciarletta, Laurent, and Mi-Jung Choi. "Automatic Configuration for VPN Using Active XML." In Operations and Management in IP-Based Networks, 173–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11567486_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Park, Jon-Tea, Jea-Hong Lee, James Won-Ki Hong, Young-Myoung Kim, and Seong-Beom Kim. "A VPN Management Architecture for Supporting CNM Services in ATM Networks." In Integrated Network Management V, 44–57. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35180-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khayat, H., L. H. Bjerring, R. S. Lund, and L. M. Ericsson. "An Open Distributed VPN Management System for a Multi-Domain Management World." In Integrated Network Management V, 786. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35180-3_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Yanyan, Zhi(Judy) Fu, and S. Felix Wu. "BANDS: An Inter-Domain Internet Security Policy Management System for IPSec/VPN." In Integrated Network Management VIII, 231–44. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Yiming, Zhen Cheng, Ziyu Wang, Shihan Chen, and Xin Su. "Fine-Grained Data Traffic Management System Based on VPN Technology." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 19–25. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98752-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ølnes, Jon, Pål Spilling, and Andrew Berquist. "Security in use and management of VPN — A banking scenario." In Lecture Notes in Computer Science, 493–502. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/bfb0013441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

May, Joan, and Aurelio Maia. "The relationship between IOs and COs in VPN charging management." In Bringing Telecommunication Services to the People — IS&N '95, 185–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0016966.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "VPN management"

1

Kulkarni, Divya, Pramila B. Shinde, Vaishnavi Y. Wani, Ashwini S. Gidge, Pradya B. Sasane, and Chetan D. Bawankar. "VPN Browser." In 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE, 2023. http://dx.doi.org/10.1109/iccakm58659.2023.10449535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cherkaoui, Omar, Ken Chen, and Ahmed Serhouchni. "Using policy management for optical VPN." In Asia-Pacific Optical and Wireless Communications Conference and Exhibit, edited by Xiaomin Ren and Tomonori Aoyama. SPIE, 2001. http://dx.doi.org/10.1117/12.445172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zaiying Liu, Ping Yang, and Lixiao Zhang. "Research of typical VPN network management mechanisms." In 2012 First National Conference for Engineering Sciences (FNCES). IEEE, 2012. http://dx.doi.org/10.1109/nces.2012.6544031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Laguidi, Ahmed, Aawatif Hayar, and Michelle Wetterwald. "Secure HeNB network management based VPN IPSec." In 2012 Next-Generation Networks and Services (NGNS). IEEE, 2012. http://dx.doi.org/10.1109/ngns.2012.6656105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Arun Kumar, Shefalika Ghosh Samaddar, and Arun K. Misra. "Enhancing VPN security through security policy management." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barguil, Samier, Oscar Gonzalez de Dios, Victor Lopez Alvarez, Roque Gagliano, Ignacio Carretero, and Ricard Vilalta. "Experimental validation of L3 VPN Network Model for improving VPN service design and provisioning." In 2020 16th International Conference on Network and Service Management (CNSM). IEEE, 2020. http://dx.doi.org/10.23919/cnsm50824.2020.9269043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Park, J. T. "Management of BGP/MPLS VPN with resilient paths." In 2004 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2004. http://dx.doi.org/10.1109/noms.2004.1317655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Malheiros, Neumar, Edmundo Madeira, Fabio Verdi, and Mauricio Magalhaes. "A Management Architecture for Layer 1 VPN Services." In 2006 3rd International Conference on Broadband Communications, Networks and Systems. IEEE, 2006. http://dx.doi.org/10.1109/broadnets.2006.4374382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wenhui, Sun, Liu Feng, Dai Gang, and Zhang Jinyu. "Formal Analysis of the VPN Service Management System." In Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007). IEEE, 2007. http://dx.doi.org/10.1109/pdcat.2007.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wenhui, Sun, Liu Feng, Dai Gang, and Zhang Jinyu. "Formal Analysis of the VPN Service Management System." In Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007). IEEE, 2007. http://dx.doi.org/10.1109/pdcat.2007.4420208.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "VPN management"

1

Tsunoda, H. BGP/MPLS Layer 3 VPN Multicast Management Information Base. RFC Editor, December 2018. http://dx.doi.org/10.17487/rfc8503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schliesser, B., and T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, November 2005. http://dx.doi.org/10.17487/rfc4265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nadeau, T., and H. van, eds. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sajassi, A., S. Thoria, M. Mishra, K. Patel, J. Drake, and W. Lin. Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Proxies for Ethernet VPN (EVPN). RFC Editor, June 2022. http://dx.doi.org/10.17487/rfc9251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Soldano, Miguel, Michelle Fryer, Euric Allan Bobb, Renato Puch, Alayna Tetreault, Jonathan Rose, Pablo Alonso, et al. Evaluation of the Results of the Realignment. Inter-American Development Bank, March 2014. http://dx.doi.org/10.18235/0010579.

Full text
Abstract:
The Realignment defined four key goals to respond to a perceived loss of Bank relevance and presence in LAC: sharpening sector focus and expertise, sharpening country focus, strengthening risk- and results-based management, and enhancing institutional efficiency. To achieve these goals, it proposed adjustments to the Bank's structure, processes, and human resources and incentives which included, among other things, the introduction of a new matrix organization, the delegation of additional responsibilities to country offices and project team leaders, the updating of operational and corporate processes, and changes in staffing and HR policies. This evaluation concludes that the Realignment's underlying direction toward a matrix structure and greater decentralization were appropriate, but it has not yet achieved all of its objectives. There are several noteworthy trends on the positive side. The technical skills of Bank staff have improved, the capacity to generate and disseminate knowledge has increased, and more authority has been delegated to country representatives and team leaders, bringing IDB closer to the client. The collaboration between staff in the same sector in country offices and headquarters has increased, as has the continuity of project team membership over the project cycle. However, the matrix is not yet functioning well. VPC has limited authority and few mechanisms to coordinate Bank inputs at the country level to ensure delivery of a coherent and efficient program. VPS and VPP have limited opportunity or incentive to bring their knowledge and influence to bear in country strategy and programming. Sector silos are tall and the pressures to lend and disburse greater than ever. As a result, the Bank and its borrowing countries are not reaping the full potential gains from cross-matrix coordination and collaboration in country strategy and program formulation, project design and implementation, and knowledge sharing. Moreover, the evaluation did not find conclusive evidence of improved efficiency. Some processes (such as quality control at the project level) appear unnecessarily time-consuming and uncertain, and the lack of full cost accounting or binding budget constraints for task teams weakens incentives for the efficient use of resources. The report offers five broad recommendations: (i) to enhance country focus, further strengthen the country program management function in country offices; (ii) to enhance inter-VP coordination and country program coherence, strengthen the role of VPS and VPP in country strategy-setting and programming; (iii) To enhance development effectiveness, strengthen mechanisms for quality control of Bank operational products; (iv) to enhance efficiency, continue to strengthen budget processes and information systems to ensure full and accurate cost accounting; and, (v) to promote effectiveness and efficiency, fill a significantly higher share of management positions through transparent competitive processes. Under each recommendation the evaluation proposes specific measures Bank management should consider (among other options) to move in the directions recommended.
APA, Harvard, Vancouver, ISO, and other styles
6

Gückelhorn, Cathrin, Olaf Struck, Matthias Dütsch, and Gesine Stephan. Bonuszahlungen an Manager : Eine Szenarienanalyse zu Gerechtigkeitsurteilen von Beschäftigten. Otto-Friedrich-Universität, 2014. http://dx.doi.org/10.20378/irb-6429.

Full text
Abstract:
Bonuszahlungen im Top-Management haben in den letzten Jahren zugenommen – genauso wie die öffentliche und politische Debatte darüber. Vor diesem Hintergrund geht der Aufsatz der Frage nach, wann Beschäftigte Bonuszahlungen an Manager als gerecht bzw. ungerecht einschätzen. Hierzu greift der Artikel auf Theorien und Ansätze der empirischen organisationalen Gerechtigkeitsforschung zurück. Datengrundlage ist eine repräsentative telefonische Befragung, in der die Teilnehmenden hypothetische Szenarien in Form von Vignetten bewerteten. Die Auswertungen zeigen, dass Situationsmerkmale im Vergleich mit soziodemografischen Merkmalen der Befragten einen starken Einfluss auf die Gerechtigkeitsurteile haben. Eine korrespondierende Erfolgsbeteiligung der Belegschaft kann demnach zur Akzeptanz von Bonuszahlungen führen. Geringere Einflüsse gehen hingegen von einer Berücksichtigung der Belegschaftsinteressen bei Entscheidungen des Managements, umfangreichen Informationen, dem Unternehmenserfolg sowie der Bonushöhe aus. Die Verantwortung des Top-Managements sowie ein Hinweis auf die Branchenüblichkeit der Bonuszahlungen besitzen keinen Einfluss. Insgesamt liefert der Beitrag damit neue Erkenntnisse zu Fragen der sozialen Gerechtigkeitund gibt Anregungen zur fairen Ausgestaltung von Bonuskomponenten.
APA, Harvard, Vancouver, ISO, and other styles
7

Hofmann, Patrick, and David Matusiewicz. New Corporate Health Management und Employee Health Protection im Kontext von COVID-19. MWV Medizinisch Wissenschaftliche Verlagsgesellschaft, July 2020. http://dx.doi.org/10.32745/wcfm-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aarnink, Andre, Loes van de Pas, Carola van der Peet-Schwering, Annemieke Hol, Gisabeth Binnendijk, Phung Le Dinh, Sasha Hafner, and Nico Ogink. Rekentool voor het bepalen van de effecten van voer- en management-maatregelen op de ammoniakemissie bij varkens: ontwikkeling en validatie. Wageningen: Wageningen Livestock Research, 2018. http://dx.doi.org/10.18174/442139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Franken, Swetlana, Lotte Prädikow, Nina Mauritz, Malte Wattenberg, and Sascha Armutat. KI-Anwendungen in der Fertigung - Chancen, Herausforderungen und Handlungsempfehlungen. Kompetenzzentrum Arbeitswelt.Plus, July 2023. http://dx.doi.org/10.55594/liqi5486.

Full text
Abstract:
Anwendungen der Künstlichen Intelligenz (KI) haben das Potenzial die Fertigungsindustrie durch die Optimierung von Prozessen, die Steigerung der Effizienz und die Verbesserung der Gesamtproduktivität zu verändern. Die Möglichkeiten, die KI in der Fertigung bietet, sind immens und reichen von selbstlernenden Maschinen, vorausschauender Instandhaltung und Abweichungserkennung bis hin zu Optimierung des Lieferkettenmanagements und Produkt- sowie Prozessdesign. Neben diesen Chancen gibt es jedoch auch Herausforderungen, die bewältigt werden müssen, um das Potenzial von KI in der Fertigung voll auszuschöpfen. Hierzu zählen zum Beispiel eine frühzeitige Qualifizierung der Beschäftigten, Datenverfügbarkeit und -qualität und ethische und datenschutzrechtliche Bedenken. Mithilfe unterschiedlicher Modelle und Instrumenten zeigen die Handlungsempfehlungen auf den Ebenen Technik, Mensch und Organisation bedeutsame Schritte zur erfolgreichen Einführung von KI-Anwendungen in der Fertigung auf. Hierzu zählen u.a. die Identifikation von KI-Anwendungsfällen, Aufbereitung der Daten, Gestaltungsansätze für das Change-Management sowie der Mensch-Maschine-Schnittstelle und eine frühzeitigen Qualifizierung und Weiterbildung der Beschäftigten.
APA, Harvard, Vancouver, ISO, and other styles
10

Salazar, Lina. Initiatives Don't Sell Themselves: Lessons Learned from the Inter-American Development Bank (IDB) Conversion Offer 2009-2010. Inter-American Development Bank, February 2011. http://dx.doi.org/10.18235/0008709.

Full text
Abstract:
Staff from five Bank departments (FIN, ITE, VPS, RMG and LEG) formed a core team that designed and executed the largest IDB conversion offer to date, and one of the largest liability management operations ever executed by emerging markets. The team learned that the design of an optional, cost neutral and scalable initiative needs to be accompanied by an effective outreach strategy and constant responsiveness to client's needs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography