Results 131 to 140 of about 486,360 (195)
Some of the next articles are maybe not open access.

Related searches:

Virtual private networks

IEEE Potentials, 2001
A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links.
Lance Pickett, Kathy S. Lassila
openaire   +2 more sources

Virtual private social networks

Proceedings of the first ACM conference on Data and application security and privacy, 2011
Social Networking Sites (SNSs) are having a significant impact on the social life of many people - even beyond the millions of people that use them directly. These websites usually allow users to present a profile of themselves through a long list of very detailed information. However, even when such SNSs have advanced privacy policies, users are often
CONTI, MAURO, Hasani A, Crispo B.
openaire   +5 more sources

IP virtual private networks

BT Technology Journal, 2000
Existing technologies, including frame relay and ATM, can be used to create virtual private networks (VPNs) over a shared infrastructure. However, two new technologies, tag switching and IP security, may be used to create IP VPNs that are independent of the access network and the core technology. This paper examines these technologies, compares them to
S Hills, D McGlaughlin, N Hanafi
openaire   +1 more source

Virtual Private Networks

2021
Virtual Private Networks (VPNs) were first created and deployed in the mid-1990s, as a response to the increasing adoption of enterprise networks, combined with increasingly broad home usage of PCs (either “portable” or desktop PCs deployed in people’s homes). Underlying network protocols have evolved and become more standardized (and more secure) over
Jason Garbis, Jerry W. Chapman
openaire   +1 more source

Dynamic virtual private networks

Bell Labs Technical Journal, 2002
Modifications to a virtual private network's (VPN's) topology, security, service provisioning options, or quality of service (QoS) typically require an end-user request to their service provider, whose personnel currently perform the VPN management. This process incurs more provisioning delay and is more costly than user self-provisioning.
Andrew R. McGee   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy