Results 21 to 30 of about 14,303 (202)
Dynamic deployment of context-aware access control policies for constrained security devices [PDF]
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic +4 more
core +1 more source
Analisa Konektivitas Jaringan IPSEC Dan OpenVPN Pada Jaringan Berbasis IP Dinamis
Saat ini jaringan merupakan kebutuhan vital bagi setiap perusahaan. Dengan internet maka jaringan dapat terbentuk dan menghubungkan antar sektor atau divisi dalam perusahaan.
As' Ari Setya, Aris Sudaryanto
doaj +1 more source
Perkembangan komunikasi jaringan yang cepat, proses mengelola dan monitoring jaringan akan lebih kompleks. Pada perusahaan yang memiliki kantor cabang yang letaknya terpisah secara geografis maka diperlukan Wide Area Network (WAN) sebagai media ...
Muhammad Fikri, Muhammad Rifqi
doaj +3 more sources
Secure Media Independent Handover Message Transport in Heterogeneous Networks
The IEEE 802.21 framework for Media Independent Handover (MIH) provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate ...
Jeong-Jae Won +3 more
doaj +2 more sources
P4sec: Automated Deployment of 802.1X, IPsec, and MACsec Network Protection in P4-Based SDN
802.1X, MACsec, and IPsec are widespread network security mechanisms that control network access and add encryption and authentication to L2 and L3 networking.
Frederik Hauser +2 more
doaj +1 more source
ВИБІР ТЕХНОЛОГІЇ ВІДДАЛЕНОГО ДОСТУПУ ДЛЯ ЕФЕКТИВНОЇ ОРГАНІЗАЦІЇ ЗАХИСТУ МЕРЕЖЕВИХ З'ЄДНАНЬ
Розглянуто сучасні методи та засоби побудови сервісу віртуальних приватних мереж, проаналізовано шляхи їх реалізації апаратно-програмними засобами на прикладі приватної віртуальної мережі на основі CISCO FlexVPN.
Ivan Tyshyk
doaj +1 more source
Analytical Model of IPsec Process Throughput
The paper concerns with a throughput of securing process which cannot be described neither by a constant value of bits per second nor by a constant value of packets per second over the range of packet sizes.
Adam Tisovsky, Ivan Baronak
doaj +1 more source
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S +1 more
core +1 more source
Literature Review on Using Internet Protocol Security (IPsec) on network Connectivity
Internet Protocol Security (IPsec) is a widely used implementation process for Virtual Private Networks (VPNs). IPsec, introduced by the Internet Engineering Task Force (IETF), is a common tunneling technology for Virtual Private Networks that enhances ...
Twana Saeed Ali
doaj +1 more source
Protokol L2TP dan IPsec Sebagai Keamanan Jaringan Pada Dinas Kominfotik Sumatera Barat
Beberapa masalah muncul pada beberapa perusahaan-perusahaan baik itu dalam skala besar maupun skala kecil. Adapun dari berbagai macam masalah yang terjadi, salah satunya adalah masalah keamanan jaringan komputer. Pada Kantor Dinas Komunikasi, Informatika
Ridho Laksamana +2 more
doaj +1 more source

