Network Authentication
Mostrando 13-18 de 18 artigos, teses e dissertações.
-
13. Proposta de um modelo de seguranÃa para VPNs na interligaÃÃo de redes corporativas
A Virtual Private Network - VPN is a protected connection, built for the private use of the enterprise, over a shared public network. A VPN uses security protocols, cryptography technologies and authentication to guarantee characteristics of a private and dedicated network to enterprises that use a not-trustworthy infrastructure, as the Internet, for interco
Publicado em: 2004
-
14. Integração de IPv6 em um ambiente cooperativo seguro
The Internet grew up within the academic community in such a manner that security mechanisms were neither required nor incorporated into the original IP protocol. During the discussions to redefine and improve the actual internet protocol (IPv4), it became clear that the new project (IPv6) should incorporate some basic security characteristics. The intention
Publicado em: 2004
-
15. Estudo comparativo dos aspectos de segurança em redes WWAN, WLAN e WPAN
The constant evolution 01 wireless technologies have prompted an increasing interest lor mobile computing in general, which in turn have contributed to advancements in mobile communication. If, on one side, wireless networks opened the possibilities for personal service businesses, they also exposed a whole new range 01 serious security issues such as greate
Publicado em: 2003
-
16. ProGrid: uma infra-estrutura de suporte a programação paralela em grades computacionais.
The computational Grid concept allows resource sharing in large scale. This work introduces the ProGrid system, an architecture for computational Grids, whose communication and resource management infrastructure is used transparently by the applications. Unlike other grid approaches, this work relies on the use of proxy servers to perform additional communic
Publicado em: 2003
-
17. Secure and Low Cost Virtual Connection Under Linux / Conectividade virtual segura e de baixo custo sob Linux
The business environment requires constant collaboration, between people and offices geographically spreaded. The corporative market has one more option for real time data transmission: the private network communications based on IP protocol. The VPN Virtual Private Network stands for the most suitable solution to reduction of costs, fundamental for small co
Publicado em: 2003
-
18. Sobre a percepÃÃo remota de sniffers para detectores de intrusÃo em redesTCP/IP
Since the early days of the Internet, security problems are a common issue. The non-correctness of code implementations of operating systems, protocol stacks, servers and administration procedure errors in networks connected to the Internet usually allow remote hacking probes and exploring, and the result is a large-scale problem with non-trivial solution. N
Publicado em: 1999