Sem: Review zu Alshamsi verfasst

This commit is contained in:
Jim Martens 2014-11-03 10:30:00 +01:00
parent 367d14e1ec
commit 023e851430
1 changed files with 2 additions and 20 deletions

View File

@ -14,6 +14,7 @@
Doi = {10.1109/AINA.2005.70},
Owner = {jim},
Review = {The comparison is very enlightening and can be used to reference the performance of both protocols. Since OpenVPN is based upon SSL, it can be used very well.},
Timestamp = {2014.10.24}
}
@ -25,25 +26,7 @@
Month = {Apr},
Publisher = {IEEE},
Abstract = {This paper deals with current Virtual Private
Network (VPN) technologies, such as Internet Protocol
Security (IPSec), Layer Two Tunneling Protocol
(L2TP), and Point to Point Tunneling Protocol (PPTP).
Furthermore, the VPN solution of the Austrian
company phion Information Technologies is presented.
After a short introduction to the basics of each
protocol, the strengths and weaknesses of each
technology are outlined, as far as interoperability,
manageability, and practical problems is concerned.
This is done by means of a practical analysis and
comparison of the results. The analysis includes
performance measurement, link quality and stability
analysis, feature comparison, interaction with TCP/IP
protocols, and some basic security attacks. In order to
provide comparable results, all technologies were
tested in the same manner. However, this paper does
not provide explicit recommendations which technology
is to be preferred.},
Abstract = {This paper deals with current Virtual Private Network (VPN) technologies, such as Internet Protocol Security (IPSec), Layer Two Tunneling Protocol (L2TP), and Point to Point Tunneling Protocol (PPTP). Furthermore, the VPN solution of the Austrian company phion Information Technologies is presented. After a short introduction to the basics of each protocol, the strengths and weaknesses of each technology are outlined, as far as interoperability, manageability, and practical problems is concerned. This is done by means of a practical analysis and comparison of the results. The analysis includes performance measurement, link quality and stability analysis, feature comparison, interaction with TCP/IP protocols, and some basic security attacks. In order to provide comparable results, all technologies were tested in the same manner. However, this paper does not provide explicit recommendations which technology is to be preferred.},
Doi = {10.1109/ARES.2006.30},
Owner = {jim},
Review = {This conference contribution is interesting, since it shows the problems of IPSec and the differences between some VPN protocols.},
@ -88,7 +71,6 @@ is to be preferred.},
Doi = {10.1109/MITP.2002.1046644},
Owner = {jim},
Review = {This article is not scientific and falls into the common science area, where everything is explained well but not really backed up with references.
This source should therefore not be used primarily, even though it comes from the IEEE.},
Timestamp = {2014.10.24}
}