[go: up one dir, main page]

Wang et al., 2000 - Google Patents

A virtual private network for virtual enterprise information systems

Wang et al., 2000

View PDF
Document ID
16854872211531682241
Author
Wang L
Yu G
Wang G
Yang X
Wang D
Dong X
Wang D
Mei Z
Publication year
Publication venue
International Conference on Web-Age Information Management

External Links

Snippet

The security requirements of a virtual enterprise information system are investigated and a virtual private network (VPN) is designed to ensure the security, taking the advantages of the integrated functionality of encryption, key management, user authentication, firewall, and …
Continue reading at ndl.ethernet.edu.et (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
US7395436B1 (en) Methods, software programs, and systems for electronic information security
Claessens et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
RU2325693C2 (en) Methods of authentication of potentials members, which were invited to join the group
Sollins Cascaded authentication.
CA2551113C (en) Authentication system for networked computer applications
US8185752B2 (en) Method and system for providing data field encryption and storage
US20170187538A1 (en) System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content
US20010020228A1 (en) Umethod, system and program for managing relationships among entities to exchange encryption keys for use in providing access and authorization to resources
US20100195824A1 (en) Method and Apparatus for Dynamic Generation of Symmetric Encryption Keys and Exchange of Dynamic Symmetric Key Infrastructure
McMahon SESAME V2 public key and authorisation extensions to Kerberos
US9112886B2 (en) Method and system for providing centralized data field encryption, and distributed storage and retrieval
Xu et al. An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption
US8401183B2 (en) Method and system for keying and securely storing data
US20070055893A1 (en) Method and system for providing data field encryption and storage
EP3785409B1 (en) Data message sharing
Guo et al. Using blockchain to control access to cloud data
RU2363985C2 (en) Call-based authentication, without need for knowledge of secret authentication data
Kyrillidis et al. Distributed e-voting using the smart card web server
Aljahdali et al. Efficient and Secure Access Control for IoT-based Environmental Monitoring
US20060129815A1 (en) Generation of identities and authentication thereof
Wang et al. A virtual private network for virtual enterprise information systems
Hu et al. EduASAC: A Blockchain-Based Education Archive Sharing and Access Control System.
Kumar et al. Realization of threats and countermeasure in Semantic Web services
Sukumaran DNA-based authentication to access internet of things-based healthcare data
CN114005190B (en) Face recognition method for class attendance system