Journal of Information Security

Volume 2, Issue 1 (January 2011)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Effective and Extensive Virtual Private Network

HTML  Download Download as PDF (Size: 903KB)  PP. 39-49  
DOI: 10.4236/jis.2011.21004    7,204 Downloads   15,572 Views  Citations

Affiliation(s)

.

ABSTRACT

A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment.

Share and Cite:

Sobh, T. and Aly, Y. (2011) Effective and Extensive Virtual Private Network. Journal of Information Security, 2, 39-49. doi: 10.4236/jis.2011.21004.

Cited by

[1] A novel Modified Chaotic Simplified Advanced Encryption System (MCS-AES): mixed reality for a secure surgical tele-presence
2020
[2] Teargas, Water Cannons and Twitter: A case study on detecting protest repression events in Turkey 2013.
2020
[3] Security Investigation on Remote Access Methods of Virtual Private Network
2020
[4] Investigating the Mediating Role of Organization's Sustainability in The Relationship between Using Greening Technology Information Tools and Organization's …
2020
[5] Teargas, Water Cannons and Twitter: A case study on detecting protest repression events in Turkey 2013
Text2story@ ecir, 2020
[6] SAFEST: Secure Actions for FTP Environment with Smart Token
2019
[7] Comparision of Application Layer Protocol For IoT Via Experimentation
International Journal of Management, Technology And Engineering, 2019
[8] Securing Wargames System Using Effective Virtual Private Network
2018
[9] Study on Virtual Private Network (VPN), VPN's Protocols And Security
2018
[10] Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing
2018
[11] Managing Cybercrimes Through the Implementation of Security Measures
Journal of Information Warfare, 2017
[12] ICTN 6885 Dr. John Pickard Spring 2016
2016
[13] Performance Analysis of Various Protocols on Virtual Private Network for IPSec
2015
[14] Information Leakage Prevention Using Virtual Disk Drive
International Journal of Computer Network and …, 2013
[15] Information Leakage Prevention Using Virtual Disk Drive.
2013
[16] Model of CanReg5 Implementation for Indonesia
Indonesian Journal of Cancer, 2012

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.