1 |
http://www.isi.edu/nsnam/ns/index.html
|
2 |
Man Li, 'Policy-Based IPsec Management,' IEEE Network, Vol. 17. no. 6, pp. 36-43, 2003
DOI
ScienceOn
|
3 |
Jeremy De Clercq, Olivier Paridaens, 'Scalability implications of virtual private networks,' IEEE Communications Magazine, no. 5, pp. 151-157, 2002
DOI
ScienceOn
|
4 |
Dinesh C. Verma, 'Simplifying Network Administration Using Policy-Based Management,' IEEE Network, vol. 16, no. 2, pp. 20-26, 2002
DOI
ScienceOn
|
5 |
Y. Yang, C. U. Martel, S. F. Wu, 'On Building the Minimum Number of Tunnels:An Ordered-Split approach to managem IPSec/VPN policies,' NOMS-IEEE/IFIP Network Operations and Management Symposium, vol. 9, no. 1, pp. 277-290, 2004
|
6 |
Lisa Phifer, 'Speeding Deployment from the Center: eTunnels VPN-on-Demand,' http://www.ispplanet.com/technology/etunnels1.html, 2000
|
7 |
B. Gleeson, A. Lin, J. Heinanen, G. Armitage A. Malis, 'A Framework for IP Based Virtual Private Networks,' RFC 2764, Informational, 2000
|
8 |
R. Atkinson, 'Security Architecture for the Internet Protocol,' RFC 1825, Standards, 1995
|
9 |
D. Harkins, D. Carrel. 'The Internet Key Exchange(IKE),' RFC 2409, Standards, 1998
|