Abstract
The security requirements of a virtual enterprise information system are investigated and a virtual private network (VPN) is designed to ensure the security, taking the advantages of the integrated functionality of encryption, key management, user authentication, firewall, and certificate authority with low cost. Several novel techniques are adopted in the VPN: 1) An effective chaotic encryption algorithm by using Logistic chaotic mapping; 2) a chaos theory based user’s “fingerprint” authentication algorithm by using mixed optically bistable chaotic model; 3) a reliable authentication mechanism by integrated Guillou-Quisquater digital signature with RSA encryption; 4) an efficient Certificate Authority (CA) and digit certificate mechanism. The details of the VPN are also presented, including a cryptography server, an auditing server, a digital signature server and an authenticating server.
The work was supported by the Fok Ying Tung Education Foundation and the National 863/CIMS Research Grant No. 863-511-946-003.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
L.M. Camarinha-Matos, H. Afsarmanesh, C. Garita, C. Lima, Towards an architecture for virtual enterprises, Journal of Intelligent Manufacturing„ 9(2), Apr. 1998, pp. 189–199.
O. Richard, A. Zarli. WONDA: An Architecture for Business Objects in Virtual Enterprise. Proc. of OOPSLA’98 Workshop on Objects, Components & VE, Vancouver, 1998.
E. Rdeke, J. Korzonnek, Distributed Information Management in Virtual Engineering Enterprise by GEN, Proc. of the 9th Intl Workshop on Research Issues on Data Engineering Information Technology for Virtual Enterprises, Sydney, 1999.
A.D. Rubin, D. Geer, A Survey of Web Security, IEEE Computer, 1998, 31(9).
P.W. Dowd, J.T. Mchenry, Network Security: It is Time to Take it Seriously, IEEE Computer, 1998, 31(9): pp. 24–28.
Tina Bird, Building VPNs: The 10-POINT PLAN, Data Communication, Jun. 1998, pp. 123–130.
X. Yang, G. Wang, G. Yu, D. Lee, Modeling Enterprise Objects in a Virtual Enterprise Integrating System, Lecture Notes in Computer Science 1749, pp. 166–175.
M.S. Baptista, Cryptography with Chaos, Physics Letters A 240(1998), pp. 50–54.
H. Zhang, J. Dai, P. Wang. Bifurcation and Chaos in an Optically Bistable Liquid-Crystal Device. Journal of Optical Soc Am B, 1986, 3(2).
L. Wang, Y. Hamazaki, Design of New Encryption and Authentication Model For Distributed Network Environment Using Object-Oriented Approach, Proc. of ICYCS’99, Aug. 1999, Nanjing.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, L. et al. (2000). A Virtual Private Network for Virtual Enterprise Information Systems. In: Lu, H., Zhou, A. (eds) Web-Age Information Management. WAIM 2000. Lecture Notes in Computer Science, vol 1846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45151-X_16
Download citation
DOI: https://doi.org/10.1007/3-540-45151-X_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67627-0
Online ISBN: 978-3-540-45151-8
eBook Packages: Springer Book Archive