Logo of Humboldt-Universität zu BerlinLogo of Humboldt-Universität zu Berlin
edoc-Server
Open-Access-Publikationsserver der Humboldt-Universität
de|en
Header image: facade of Humboldt-Universität zu Berlin
View Item 
  • edoc-Server Home
  • Tagungs- und Konferenzbände
  • Proceedings of the 7th International Conference of European University Information Systems EUNIS2001 (Humboldt-Universität zu Berlin, 28.03.2001 - 30.03.2001)
  • View Item
  • edoc-Server Home
  • Tagungs- und Konferenzbände
  • Proceedings of the 7th International Conference of European University Information Systems EUNIS2001 (Humboldt-Universität zu Berlin, 28.03.2001 - 30.03.2001)
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
All of edoc-ServerCommunity & CollectionTitleAuthorSubjectThis CollectionTitleAuthorSubject
PublishLoginRegisterHelp
StatisticsView Usage Statistics
All of edoc-ServerCommunity & CollectionTitleAuthorSubjectThis CollectionTitleAuthorSubject
PublishLoginRegisterHelp
StatisticsView Usage Statistics
View Item 
  • edoc-Server Home
  • Tagungs- und Konferenzbände
  • Proceedings of the 7th International Conference of European University Information Systems EUNIS2001 (Humboldt-Universität zu Berlin, 28.03.2001 - 30.03.2001)
  • View Item
  • edoc-Server Home
  • Tagungs- und Konferenzbände
  • Proceedings of the 7th International Conference of European University Information Systems EUNIS2001 (Humboldt-Universität zu Berlin, 28.03.2001 - 30.03.2001)
  • View Item
2001-03-30Konferenzveröffentlichung DOI: 10.18452/1033
Securing a geographically distributed network: An example design
Moreno, Manuel Galán
Carreras, Antonio Ocón
Padilla, Agustín Fernández
Royo, Enrique Rubio
Humboldt-Universität zu Berlin
Information Technologies (IT s) are making possible the integration of different information systems used by geographically dispersed organizations. An integration model must facilitate the combination of internet, intranet and extranet concepts with a high fiability security policy and it ought to be perfectly adapted to the organizational structure. An adequate security policy must consider the establishment of a Virtual Private Network (VPN) identifying different potential clients: clients connected to the intranet by modem, by isdn, etc; clients connected to the VPN; or teleworking stations accessing through the extranet. Thus, this study aims to define the function of all those elements which provide security in an VPN such as firewalls and encryptation systems and to reduce the vulnerability of the elements taking part in an information exchange.
Files in this item
Thumbnail
Fernandez.pdf — Adobe PDF — 269.2 Kb
MD5: 19cb266e19fe5ccafdc08cb959993b86
1338_html.zip — Unknown — 270.6 Kb
MD5: 6d0531762737fc42b820c40ec548098a
Cite
BibTeX
EndNote
RIS
InCopyright
Details
DINI-Zertifikat 2019OpenAIRE validatedORCID Consortium
Imprint Policy Contact Data Privacy Statement
A service of University Library and Computer and Media Service
© Humboldt-Universität zu Berlin
 
DOI
10.18452/1033
Permanent URL
https://doi.org/10.18452/1033
HTML
<a href="https://doi.org/10.18452/1033">https://doi.org/10.18452/1033</a>