On the cost of virtual private networks
IEEE/ACM Transactions on Networking (TON)
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A Study on the Willingness of Using FON in the Domain of Wireless Communication
NCM '08 Proceedings of the 2008 Fourth International Conference on Networked Computing and Advanced Information Management - Volume 02
Trusted Network Access Control in the Eduroam Federation
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
Network Address Translation: Extending the Internet Address Space
IEEE Internet Computing
Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts
IEEE Communications Magazine
A construction of locality-aware overlay network: mOverlay and its performance
IEEE Journal on Selected Areas in Communications
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
In this paper, we propose a distributed authentication mechanism for sharing an overlay network among multiple organizations in order to establish secure connections among members for each organization. By combining a layer 2 virtual private network technology with a method for transmitting authenticated frames like Point-to-point protocol over Ethernet, we can avoid the threat of spoofing attack or phishing on network layer. We have implemented the prototypes both for the Internet Applications over IP and for the voice switching networks that support organization / communities.