Academic literature on the topic 'VPN management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'VPN management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "VPN management"
Liu, Zai Ying, Ping Yang, and Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms." Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.
Full textHudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (July 1, 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.
Full textHidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (December 7, 2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.
Full textAlashi, Shahad A., and Hanaa A. Aldahawi. "Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 20, 2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.
Full textLi, Qiang, and Hua Long Liu. "RFID Network and its Application in Management of Aviation Maintenance." Applied Mechanics and Materials 475-476 (December 2013): 920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.920.
Full textSalman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.
Full textGaspoz, Jean-Paul, Jean-Pierre Hubaux, and Simon Znaty. "A generic architecture for VPN configuration management." Journal of Network and Systems Management 4, no. 4 (December 1996): 375–95. http://dx.doi.org/10.1007/bf02283161.
Full textPangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 2 (June 9, 2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.
Full textDamasco Jr., Loreto B., Noel Raymund F. Lacson, and Roger T. Intong. "Safeguarding Transactional Data: A Comprehensive Investigation of VPN Integration in Point-of-Sale Systems for Enhanced Security and Connectivity." Eximia 12 (December 14, 2023): 570–89. http://dx.doi.org/10.47577/eximia.v12i1.405.
Full textZhang, Guo Fang. "The Solution and Management of VPN Based IPSec Technology." Applied Mechanics and Materials 686 (October 2014): 210–19. http://dx.doi.org/10.4028/www.scientific.net/amm.686.210.
Full textDissertations / Theses on the topic "VPN management"
Dahlberg, Axel, and Jonas Francén. "IPv6-adresshantering och prefixdelegering i MPLS VPN-nät." Thesis, KTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123805.
Full textFull migration to IPv6 brings the need to adjust datacommunication services for the new generationof IP protocols with maintained or expanded functionality. This thesis’ goals is to submitone or more solutions that meets requirements and the technical conditions that enables thecompany DGC:s to expand the service IP-VPN for IPv6. This includes address assignmenttechniques like prefix delegation and automatic address configuration in existing network infrastructure.Solutions are presented in six scenarios that have been investigated considering tests, analysis andexperienced problems. The investigation formed the criteria scalability, configuration complexity,compatibility, support by RFC:s and requirements stated by DGC that adds to the evaluationof the most suitable solution.The evaluation has resulted in a recommended scenario that is implementable according to givengoals.Techniques that may influence the choice of most suitable solution, but that is not yet available,are discussed and presented to point out what may needed to be considered in the future.
Salha, Guillaume. "Management des systèmes d'information et télécommunications." Perpignan, 2006. http://www.theses.fr/2006PERP0712.
Full textThe subject concerns the management of the Information systems and Telecommunications. I propose a detailed description of various topologies of inter-connection and security. I propose a modelisation of the information processing systems, to study the behavior of the systems on models and not on the system itself. I present an innovating solution based on the concept of IP collect and Multi operator routing, using the XDSL technologies of infrastructure operators, to the router in a centralized site. I propose project guidelines and methodology intended to provide a common framework covering the control of the fundamental processes and their organizational and technical impacts on the deployment in companies
Palomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939092.
Full textPalomares, Velasquez Daniel. "Study of mechanisms ensuring service continuity for IKEv2 and IPsec protocols." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0025.
Full textDuring 2012, the global mobile traffic represented 70\% more than 2011. The arrival of the 4G technology introduced 19 times more traffic than non-4G sessions, and in 2013 the number of mobile-connected to the Internet exceeded the number of human beings on earth. This scenario introduces great pressure towards the Internet service providers (ISPs), which are called to ensure access to the network and maintain its QoS. At short/middle term, operators will relay on alternative access networks in order to maintain the same performance characteristics. Thus, the traffic of the clients might be offloaded from RANs to some other available access networks. However, the same security level is not ensured by those wireless access networks. Femtocells, WiFi or WiMAX (among other wireless technologies), must rely on some mechanism to secure the communications and avoid untrusted environments. Operators are mainly using IPsec to extend a security domain over untrusted networks. This introduces new challenges in terms of performance and connectivity for IPsec. This thesis concentrates on the study of the mechanism considering improving the IPsec protocol in terms of continuity of service. The continuity of service, also known as resilience, becomes crucial when offloading the traffic from RANs to other access networks. This is why we first concentrate our effort in defining the protocols ensuring an IP communication: IKEv2 and IPsec. Then, we present a detailed study of the parameters needed to keep a VPN session alive, and we demonstrate that it is possible to dynamically manage a VPN session between different gateways. Some of the reasons that justify the management of VPN sessions is to provide high availability, load sharing or load balancing features for IPsec connections. These mechanisms increase the continuity of service of IPsec-based communication. For example, if for some reason a failure occurs to a security gateway, the ISP should be able to overcome this situation and to provide mechanisms to ensure continuity of service to its clients. Some new mechanisms have recently been implemented to provide High Availability over IPsec. The open source VPN project, StrongSwan, implemented a mechanism called ClusterIP in order to create a cluster of IPsec gateways. We merged ClusterIP with our own developments in order to define two architectures: High Availability and Context Management over Mono-LAN and Multi-LAN environments. We called Mono-LAN those architectures where the cluster of security gateways is configured under a single IP address, whereas Multi-LAN concerns those architectures where different security gateways are configured with different IP addresses. Performance measurements throughout the thesis show that transferring a VPN session between different gateways avoids re-authentication delays and reduce the amount of CPU consumption and calculation of cryptographic material. From an ISP point of view, this could be used to avoid overloaded gateways, redistribution of the load, better network performances, improvements of the QoS, etc. The idea is to allow a peer to enjoy the continuity of a service while maintaining the same security level that it was initially proposed
Hümmer, Bernd. "Strategisches Management von Kernkompetenzen im Hyperwettbewerb : Operationalisierung kernkompetenzorientierten Managements für dynamische Umfeldbedingungen /." Wiesbaden : Wiesbaden : Deutscher Universitäts-Verlag ; Gabler, 2001. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009424527&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textHusen, Christian van [Verfasser]. "Anforderungsanalyse für produktbegleitende Dienstleistungen / vorgelegt von Christian van Husen." Heimsheim : Jost-Jetter, 2007. http://d-nb.info/994963432/34.
Full text[Verfasser]. "Anforderungsanalyse für produktbegleitende Dienstleistungen / vorgelegt von Christian van Husen." Heimsheim : Jost-Jetter, 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-31920.
Full textKeuken, Friedhelm. "Management von Akademikerorganisationen /." Hamburg : Kovač, 1996. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=007232128&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textFankhauser, Kathrin. "Management von Organisationskulturen /." Bern ; Stuttgart ; Wien : Haupt, 1996. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=007199997&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textZagler, Michael. "Management von Einkaufssynergien /." [S.l. : s.n.], 2003. http://www.gbv.de/dms/zbw/373225024.pdf.
Full textBooks on the topic "VPN management"
Peter, Giannoulis, and Hay Keli, eds. Nokia firewall, VPN, and IPSO configuration guide. Burlington, MA: Syngress Pub., 2009.
Find full textBellabarba, Alexander, Phillipp Radtke, and Dirk Wilmes. Management von Kundenbeziehungen. München: Carl Hanser Verlag GmbH & Co. KG, 2002. http://dx.doi.org/10.3139/9783446226616.
Full textBlumberg, Boris. Management von Technologiekooperationen. Wiesbaden: Deutscher Universitätsverlag, 1998. http://dx.doi.org/10.1007/978-3-663-08122-7.
Full textStoyan, Robert, ed. Management von Webprojekten. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71195-7.
Full textOdenthal, Stefan. Management von Unternehmungsteilungen. Wiesbaden: Deutscher Universitätsverlag, 1999. http://dx.doi.org/10.1007/978-3-322-97794-6.
Full textGemünden, Hans Georg, and Martin Högl, eds. Management von Teams. Wiesbaden: Gabler Verlag, 2001. http://dx.doi.org/10.1007/978-3-322-82920-7.
Full textEller, Roland, Markus Heinrich, René Perrot, and Markus Reif, eds. Management von Rohstoffrisiken. Wiesbaden: Gabler, 2010. http://dx.doi.org/10.1007/978-3-8349-8562-0.
Full textSydow, Jörg, ed. Management von Netzwerkorganisationen. Wiesbaden: Gabler Verlag, 2010. http://dx.doi.org/10.1007/978-3-8349-8593-4.
Full textHofer, Adrian P. Management von Produktfamilien. Wiesbaden: Deutscher Universitätsverlag, 2001. http://dx.doi.org/10.1007/978-3-663-07940-8.
Full textSchreiber, Daniel. Management von Controllingwissen. Wiesbaden: Gabler, 2010. http://dx.doi.org/10.1007/978-3-8349-8623-8.
Full textBook chapters on the topic "VPN management"
Alharbi, Adel, Ayoub Bahnasse, Mohamed Talea, Hafsa Ait Oulahyane, and Fatima Ezzahraa Louhab. "Smart SDN Policy Management Based VPN Multipoint." In Advances in Intelligent Systems and Computing, 250–63. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91337-7_24.
Full textChan, M. C., A. A. Lazar, and R. Stadler. "Customer Management and Control of Broadband VPN Services." In Integrated Network Management V, 301–14. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35180-3_23.
Full textSaydam, T., J. P. Gaspoz, P. A. Etique, and J. P. Hubaux. "Object-oriented design of a VPN bandwidth management system." In Integrated Network Management IV, 344–55. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34890-2_31.
Full textCiarletta, Laurent, and Mi-Jung Choi. "Automatic Configuration for VPN Using Active XML." In Operations and Management in IP-Based Networks, 173–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11567486_18.
Full textPark, Jon-Tea, Jea-Hong Lee, James Won-Ki Hong, Young-Myoung Kim, and Seong-Beom Kim. "A VPN Management Architecture for Supporting CNM Services in ATM Networks." In Integrated Network Management V, 44–57. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35180-3_4.
Full textKhayat, H., L. H. Bjerring, R. S. Lund, and L. M. Ericsson. "An Open Distributed VPN Management System for a Multi-Domain Management World." In Integrated Network Management V, 786. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35180-3_68.
Full textYang, Yanyan, Zhi(Judy) Fu, and S. Felix Wu. "BANDS: An Inter-Domain Internet Security Policy Management System for IPSec/VPN." In Integrated Network Management VIII, 231–44. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35674-7_28.
Full textLiu, Yiming, Zhen Cheng, Ziyu Wang, Shihan Chen, and Xin Su. "Fine-Grained Data Traffic Management System Based on VPN Technology." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 19–25. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98752-1_3.
Full textØlnes, Jon, Pål Spilling, and Andrew Berquist. "Security in use and management of VPN — A banking scenario." In Lecture Notes in Computer Science, 493–502. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/bfb0013441.
Full textMay, Joan, and Aurelio Maia. "The relationship between IOs and COs in VPN charging management." In Bringing Telecommunication Services to the People — IS&N '95, 185–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0016966.
Full textConference papers on the topic "VPN management"
Kulkarni, Divya, Pramila B. Shinde, Vaishnavi Y. Wani, Ashwini S. Gidge, Pradya B. Sasane, and Chetan D. Bawankar. "VPN Browser." In 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM). IEEE, 2023. http://dx.doi.org/10.1109/iccakm58659.2023.10449535.
Full textCherkaoui, Omar, Ken Chen, and Ahmed Serhouchni. "Using policy management for optical VPN." In Asia-Pacific Optical and Wireless Communications Conference and Exhibit, edited by Xiaomin Ren and Tomonori Aoyama. SPIE, 2001. http://dx.doi.org/10.1117/12.445172.
Full textZaiying Liu, Ping Yang, and Lixiao Zhang. "Research of typical VPN network management mechanisms." In 2012 First National Conference for Engineering Sciences (FNCES). IEEE, 2012. http://dx.doi.org/10.1109/nces.2012.6544031.
Full textLaguidi, Ahmed, Aawatif Hayar, and Michelle Wetterwald. "Secure HeNB network management based VPN IPSec." In 2012 Next-Generation Networks and Services (NGNS). IEEE, 2012. http://dx.doi.org/10.1109/ngns.2012.6656105.
Full textSingh, Arun Kumar, Shefalika Ghosh Samaddar, and Arun K. Misra. "Enhancing VPN security through security policy management." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194494.
Full textBarguil, Samier, Oscar Gonzalez de Dios, Victor Lopez Alvarez, Roque Gagliano, Ignacio Carretero, and Ricard Vilalta. "Experimental validation of L3 VPN Network Model for improving VPN service design and provisioning." In 2020 16th International Conference on Network and Service Management (CNSM). IEEE, 2020. http://dx.doi.org/10.23919/cnsm50824.2020.9269043.
Full textPark, J. T. "Management of BGP/MPLS VPN with resilient paths." In 2004 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2004. http://dx.doi.org/10.1109/noms.2004.1317655.
Full textMalheiros, Neumar, Edmundo Madeira, Fabio Verdi, and Mauricio Magalhaes. "A Management Architecture for Layer 1 VPN Services." In 2006 3rd International Conference on Broadband Communications, Networks and Systems. IEEE, 2006. http://dx.doi.org/10.1109/broadnets.2006.4374382.
Full textWenhui, Sun, Liu Feng, Dai Gang, and Zhang Jinyu. "Formal Analysis of the VPN Service Management System." In Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007). IEEE, 2007. http://dx.doi.org/10.1109/pdcat.2007.16.
Full textWenhui, Sun, Liu Feng, Dai Gang, and Zhang Jinyu. "Formal Analysis of the VPN Service Management System." In Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007). IEEE, 2007. http://dx.doi.org/10.1109/pdcat.2007.4420208.
Full textReports on the topic "VPN management"
Tsunoda, H. BGP/MPLS Layer 3 VPN Multicast Management Information Base. RFC Editor, December 2018. http://dx.doi.org/10.17487/rfc8503.
Full textSchliesser, B., and T. Nadeau. Definition of Textual Conventions for Virtual Private Network (VPN) Management. RFC Editor, November 2005. http://dx.doi.org/10.17487/rfc4265.
Full textNadeau, T., and H. van, eds. MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base. RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4382.
Full textSajassi, A., S. Thoria, M. Mishra, K. Patel, J. Drake, and W. Lin. Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Proxies for Ethernet VPN (EVPN). RFC Editor, June 2022. http://dx.doi.org/10.17487/rfc9251.
Full textSoldano, Miguel, Michelle Fryer, Euric Allan Bobb, Renato Puch, Alayna Tetreault, Jonathan Rose, Pablo Alonso, et al. Evaluation of the Results of the Realignment. Inter-American Development Bank, March 2014. http://dx.doi.org/10.18235/0010579.
Full textGückelhorn, Cathrin, Olaf Struck, Matthias Dütsch, and Gesine Stephan. Bonuszahlungen an Manager : Eine Szenarienanalyse zu Gerechtigkeitsurteilen von Beschäftigten. Otto-Friedrich-Universität, 2014. http://dx.doi.org/10.20378/irb-6429.
Full textHofmann, Patrick, and David Matusiewicz. New Corporate Health Management und Employee Health Protection im Kontext von COVID-19. MWV Medizinisch Wissenschaftliche Verlagsgesellschaft, July 2020. http://dx.doi.org/10.32745/wcfm-5.
Full textAarnink, Andre, Loes van de Pas, Carola van der Peet-Schwering, Annemieke Hol, Gisabeth Binnendijk, Phung Le Dinh, Sasha Hafner, and Nico Ogink. Rekentool voor het bepalen van de effecten van voer- en management-maatregelen op de ammoniakemissie bij varkens: ontwikkeling en validatie. Wageningen: Wageningen Livestock Research, 2018. http://dx.doi.org/10.18174/442139.
Full textFranken, Swetlana, Lotte Prädikow, Nina Mauritz, Malte Wattenberg, and Sascha Armutat. KI-Anwendungen in der Fertigung - Chancen, Herausforderungen und Handlungsempfehlungen. Kompetenzzentrum Arbeitswelt.Plus, July 2023. http://dx.doi.org/10.55594/liqi5486.
Full textSalazar, Lina. Initiatives Don't Sell Themselves: Lessons Learned from the Inter-American Development Bank (IDB) Conversion Offer 2009-2010. Inter-American Development Bank, February 2011. http://dx.doi.org/10.18235/0008709.
Full text