Data Privacy Assurance in Virtual Private Networks
Author(s): COSTEA, Ioan
Author(s) keywords: network, privacy, security, VPN
Reference keywords: network security
Abstract:
VPN (Virtual Private Network) can be defined as a private connection between two stations or networks, established through an open public network. VPN technology allows a company to expand their services over the Internet, remotely, in conditions of maximum security. The VPN solution is suitable for companies that need secure and stable connectivity to applications and resources for an unlimited number of concurrent users. A VPN network is initiated around a security protocol that encrypts or decrypts data at the source and destination.
References:
[1]. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt and A. Warfield, “Xenand the Art of Virtualization”, 19th ACM Symposium on Operating Systems Principles – SOSP, 2003.
[2]. P.M. Chen, B.D. Noble, “When Virtual Is Better Than Real”, Proceedings of the 2001 Workshop on Hot Topics in Operating Systems, 2001.
[3]. P. Ferrie, “Attacks on Virtual Machine Emulators”, SYMANTEC ADVANCED THREAT RESEARCH, 2006.
[4]. R. Goldberg, “Architecture of Virtual Machines”, AFIPS National Computer Conference, New York, USA, 2006.
[5]. J. Kirch, “Virtual Machine Security Guideline”, The Center for Internet Security, 2007.
[6]. L. McLaughlin, “How to Find and Fix 10 Real Security Threats on Your Virtual Servers”, CIO, 2007.
[7]. Ș-V Nicolaescu, “Aplicații în rețele virtuale private”, Buletinul AGIR, 2008.
[8]. M. Sabău, “Reţele virtuale private”, Net Report, noiembrie 2004.
[9]. R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. Doorn, J. Griffin and S. Berger, “Secure Hypervisor Approach to Trusted Virtualized Systems”, IBM, 2005.
English title: Data Privacy Assurance in Virtual Private Networks
Original title: Asigurarea confidenţialității datelor în reţelele private virtuale
Author(s): COSTEA, Ioan
Article Language: Romanian
Date of Publication: 2012-12-21
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2012.02.05
Issue: Volume 1, Issue 2, Year 2012
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 40-47 (8 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.