1
0
mirror of https://github.com/2martens/uni.git synced 2026-05-06 19:36:26 +02:00

Sem: Review für einige Referenzen verfasst

This commit is contained in:
Jim Martens
2014-11-01 17:05:30 +01:00
parent fee1ce0fc7
commit 367d14e1ec

View File

@ -25,8 +25,28 @@
Month = {Apr}, Month = {Apr},
Publisher = {IEEE}, Publisher = {IEEE},
Abstract = {This paper deals with current Virtual Private
Network (VPN) technologies, such as Internet Protocol
Security (IPSec), Layer Two Tunneling Protocol
(L2TP), and Point to Point Tunneling Protocol (PPTP).
Furthermore, the VPN solution of the Austrian
company phion Information Technologies is presented.
After a short introduction to the basics of each
protocol, the strengths and weaknesses of each
technology are outlined, as far as interoperability,
manageability, and practical problems is concerned.
This is done by means of a practical analysis and
comparison of the results. The analysis includes
performance measurement, link quality and stability
analysis, feature comparison, interaction with TCP/IP
protocols, and some basic security attacks. In order to
provide comparable results, all technologies were
tested in the same manner. However, this paper does
not provide explicit recommendations which technology
is to be preferred.},
Doi = {10.1109/ARES.2006.30}, Doi = {10.1109/ARES.2006.30},
Owner = {jim}, Owner = {jim},
Review = {This conference contribution is interesting, since it shows the problems of IPSec and the differences between some VPN protocols.},
Timestamp = {2014.10.27} Timestamp = {2014.10.27}
} }
@ -64,8 +84,12 @@
Pages = {47--52}, Pages = {47--52},
Volume = {4}, Volume = {4},
Abstract = {This article describes the history of SSL/TLS and shows how it works. This goal is reached by explaining the basic differences between asymmetrical and symmetrical encryption algorithms, followed by the process that is used by SSL to start a secure session.},
Doi = {10.1109/MITP.2002.1046644}, Doi = {10.1109/MITP.2002.1046644},
Owner = {jim}, Owner = {jim},
Review = {This article is not scientific and falls into the common science area, where everything is explained well but not really backed up with references.
This source should therefore not be used primarily, even though it comes from the IEEE.},
Timestamp = {2014.10.24} Timestamp = {2014.10.24}
} }
@ -376,6 +400,7 @@
Abstract = {A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links. VPN services enable remote access to the intranet at significantly lower cost, thus enabling support for a mobile workforce. Additionally, the VPN architecture support a reliable authentication mechanism to provide easy access to the intranet from anywhere using any available access media including analog modems, ISDN, cable modems, DSL and wireless. There are primarily three types of VPN services: (1) local area network (LAN) interconnect VPN services, (2) dial-up VPN services, and (3) Ethernet VPN services}, Abstract = {A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links. VPN services enable remote access to the intranet at significantly lower cost, thus enabling support for a mobile workforce. Additionally, the VPN architecture support a reliable authentication mechanism to provide easy access to the intranet from anywhere using any available access media including analog modems, ISDN, cable modems, DSL and wireless. There are primarily three types of VPN services: (1) local area network (LAN) interconnect VPN services, (2) dial-up VPN services, and (3) Ethernet VPN services},
Owner = {jim}, Owner = {jim},
Review = {This article is 13 years old and you can see it. Most of the information is outdated and therefore not properly usable in a 2014 seminar paper about two VPN technologies. Furthermore it is not so much scientific as it is more like prose.},
Timestamp = {2014.10.18} Timestamp = {2014.10.18}
} }