IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Data Privacy Assurance in Virtual Private Networks


    Author(s): COSTEA, Ioan

    Quick view | Full article | Citations | Views: 1,824


    Author(s) keywords: , , ,


    Reference keywords:


    Abstract:

    VPN (Virtual Private Network) can be defined as a private connection between two stations or networks, established through an open public network. VPN technology allows a company to expand their services over the Internet, remotely, in conditions of maximum security. The VPN solution is suitable for companies that need secure and stable connectivity to applications and resources for an unlimited number of concurrent users. A VPN network is initiated around a security protocol that encrypts or decrypts data at the source and destination.



    References:

    [1]. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt and A. Warfield, “Xenand the Art of Virtualization”, 19th ACM Symposium on Operating Systems Principles – SOSP, 2003.

    [2]. P.M. Chen, B.D. Noble, “When Virtual Is Better Than Real”, Proceedings of the 2001 Workshop on Hot Topics in Operating Systems, 2001.

    [3]. P. Ferrie, “Attacks on Virtual Machine Emulators”, SYMANTEC ADVANCED THREAT RESEARCH, 2006.

    [4]. R. Goldberg, “Architecture of Virtual Machines”, AFIPS National Computer Conference, New York, USA, 2006.

    [5]. J. Kirch, “Virtual Machine Security Guideline”, The Center for Internet Security, 2007.

    [6]. L. McLaughlin, “How to Find and Fix 10 Real Security Threats on Your Virtual Servers”, CIO, 2007.

    [7]. Ș-V Nicolaescu, “Aplicații în rețele virtuale private”, Buletinul AGIR, 2008.

    [8]. M. Sabău, “Reţele virtuale private”, Net Report, noiembrie 2004.

    [9]. R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. Doorn, J. Griffin and S. Berger, “Secure Hypervisor Approach to Trusted Virtualized Systems”, IBM, 2005.



    Additional Information

    English title: Data Privacy Assurance in Virtual Private Networks
    Original title: Asigurarea confidenţialității datelor în reţelele private virtuale
    Author(s): COSTEA, Ioan
    Article Language: Romanian
    Date of Publication: 2012-12-21
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2012.02.05
    Issue: Volume 1, Issue 2, Year 2012
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 40-47 (8 pages)



    Copyright ©2012-2025
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.