Wang et al., 2000 - Google Patents
A virtual private network for virtual enterprise information systemsWang et al., 2000
View PDF- Document ID
- 16854872211531682241
- Author
- Wang L
- Yu G
- Wang G
- Yang X
- Wang D
- Dong X
- Wang D
- Mei Z
- Publication year
- Publication venue
- International Conference on Web-Age Information Management
External Links
Snippet
The security requirements of a virtual enterprise information system are investigated and a virtual private network (VPN) is designed to ensure the security, taking the advantages of the integrated functionality of encryption, key management, user authentication, firewall, and …
- 230000000739 chaotic 0 abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7395436B1 (en) | Methods, software programs, and systems for electronic information security | |
Claessens et al. | (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions | |
RU2325693C2 (en) | Methods of authentication of potentials members, which were invited to join the group | |
Sollins | Cascaded authentication. | |
CA2551113C (en) | Authentication system for networked computer applications | |
US8185752B2 (en) | Method and system for providing data field encryption and storage | |
US20170187538A1 (en) | System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content | |
US20010020228A1 (en) | Umethod, system and program for managing relationships among entities to exchange encryption keys for use in providing access and authorization to resources | |
US20100195824A1 (en) | Method and Apparatus for Dynamic Generation of Symmetric Encryption Keys and Exchange of Dynamic Symmetric Key Infrastructure | |
McMahon | SESAME V2 public key and authorisation extensions to Kerberos | |
US9112886B2 (en) | Method and system for providing centralized data field encryption, and distributed storage and retrieval | |
Xu et al. | An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption | |
US8401183B2 (en) | Method and system for keying and securely storing data | |
US20070055893A1 (en) | Method and system for providing data field encryption and storage | |
EP3785409B1 (en) | Data message sharing | |
Guo et al. | Using blockchain to control access to cloud data | |
RU2363985C2 (en) | Call-based authentication, without need for knowledge of secret authentication data | |
Kyrillidis et al. | Distributed e-voting using the smart card web server | |
Aljahdali et al. | Efficient and Secure Access Control for IoT-based Environmental Monitoring | |
US20060129815A1 (en) | Generation of identities and authentication thereof | |
Wang et al. | A virtual private network for virtual enterprise information systems | |
Hu et al. | EduASAC: A Blockchain-Based Education Archive Sharing and Access Control System. | |
Kumar et al. | Realization of threats and countermeasure in Semantic Web services | |
Sukumaran | DNA-based authentication to access internet of things-based healthcare data | |
CN114005190B (en) | Face recognition method for class attendance system |