mirror of
https://github.com/2martens/uni.git
synced 2026-05-06 11:26:25 +02:00
Sem: Angaben zu Böhmer ergänzt
This commit is contained in:
@ -54,11 +54,12 @@
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Book{Boehmer2005,
|
@Book{Boehmer2005,
|
||||||
Title = {Virtual Private Networks},
|
Title = {{VPN} - {V}irtual {P}rivate {N}etworks},
|
||||||
Author = {Böhmer, Wolfgang},
|
Author = {Böhmer, Wolfgang},
|
||||||
Year = {2005},
|
Year = {2005},
|
||||||
Edition = {2nd},
|
Edition = {2},
|
||||||
Publisher = {Hanser},
|
Publisher = {Hanser},
|
||||||
|
Titleaddon = {Kommunikationssicherheit in VPN- und IP-Netzen über GPRS und WLAN},
|
||||||
|
|
||||||
Owner = {jim},
|
Owner = {jim},
|
||||||
Timestamp = {2014.10.27}
|
Timestamp = {2014.10.27}
|
||||||
@ -585,8 +586,7 @@
|
|||||||
Organization = {IEEE},
|
Organization = {IEEE},
|
||||||
Pages = {548--551},
|
Pages = {548--551},
|
||||||
|
|
||||||
Abstract = {SSL/TLS VPN is the better choice for remote access to a private network, while IPSec is better for the connection between two fixed endpoints.
|
Abstract = {SSL/TLS VPN is the better choice for remote access to a private network, while IPSec is better for the connection between two fixed endpoints. With IPSec the data is transported unencrypted between the application and the VPN start point and from the VPN end point to the application. In a remote access example, all the data would be readable from inside the target network. Furthermore an attacker only needs access to the client computer and can then use the connection, without being authenticated. With SSL VPN the encryption is application to application and the authentication and authorization happens for each connection. Access to a connection is unequally more difficult than access to a computer.},
|
||||||
With IPSec the data is transported unencrypted between the application and the VPN start point and from the VPN end point to the application. In a remote access example, all the data would be readable from inside the target network. Furthermore an attacker only needs access to the client computer and can then use the connection, without being authenticated. With SSL VPN the encryption is application to application and the authentication and authorization happens for each connection. Access to a connection is unequally more difficult than access to a computer.},
|
|
||||||
Owner = {jim},
|
Owner = {jim},
|
||||||
Timestamp = {2014.12.13}
|
Timestamp = {2014.12.13}
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user