IPSEC and SSL as solutions for the enterprise network security

Автор: Sichkar V.N.

Журнал: Juvenis scientia @jscientia

Рубрика: Технические науки

Статья в выпуске: 1, 2018 года.

Бесплатный доступ

When a company starts to build enterprise network, the information technology department always faces the question about which protocol to choose for building a Virtual Private Network (VPN). The answer is not obvious because each protocol has its own pros and cons. Priority of the selection of the protocol to build the VPN depends on specific criteria. These criteria can be the required type of access for users, the level of the network security, the level of data security, necessity of scalability for the network in future, etc. At the moment the most reliable protocols are considered to be Internet Protocol Security (IPSec) and Secure Socket Layer (SSL). This paper discusses and analysis the demand of using these protocols separately or simultaneously.

Еще

Ipsec протокол, ipsec protocol, ssl протокол, ssl protocol, vpn, network security, enterprise network, data security, encryption of data transfer

Короткий адрес: https://readera.ru/14110462

IDR: 14110462   |   DOI: 10.15643/jscientia.2018.01.004

Список литературы IPSEC and SSL as solutions for the enterprise network security

  • Rosu S.M., Dragoi G. VPN Solutions and Network Monitoring to Support Virtual Teams Work in Virtual Enterprises//Computer Science and Information System. 2011. Vol.8(1). Pp. 1-26.
  • Maurer U., Ruedlinger A., Tackmann B. Confidentiality and integrity: a constructive perspective//TCC Springer. 2012. Pp. 209-229.
  • Rosu S.M., Dragoi G. Virtual Enterprise Network General Architecture.//8th International Conference on Communications. Bucharest, Romania. 2010. Pp. 313-316.
  • Zaharuddin M.H.M., Rahman R.A., Kassim M. Technical comparison analysis of encryption algorithm on site-to-site IPSec VPN//International Conference on Computer Applications and Industrial Electronics. Kuala Lumpur, 2010. Pp. 641-645.
  • Dayananda M.S., Kumar A. Architecture for Intercloud Services Using IPsec VPN//Second International Conference on Advanced Computing & Communication Technologies. Rohtak, Haryana, 2012. Pp. 463-467.
  • Gallo C., Michelangelo B., Michele P. Virtual Private Networks//Encyclopedia of Information Science and Technology/IGI Globa, 2015.
  • Casado M., Freeman M.J., Pettit J., Luo J., Gude N., McKeown N., Shenker S. Rethinking enterprise network control//Transactions on Networking. 2009. Vol.17. Pp. 1270-1283.
  • Ward J., Peppard J. Strategic planning for information systems//John Wiley & Sons Press. UK, West Sussex, 2002.
  • Rosu S.M., Dragoi G. Virtual Enterprise Network General Architecture.//8th International Conference on Communications. Bucharest, Romania, 2010. Pp. 313-316.
  • Coretti S., Maurer U., Tackmann B. Constructing confidential channels from authenticated channels -public-key encryption revisited. Advances in Cryptology//ASIACRYPT Springer, 2013. Part I. Pp. 134-153.
Еще
Статья научная