Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Virtual Private Network for Virtual Enterprise Information Systems

  • Conference paper
  • First Online:
Web-Age Information Management (WAIM 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1846))

Included in the following conference series:

  • 394 Accesses

Abstract

The security requirements of a virtual enterprise information system are investigated and a virtual private network (VPN) is designed to ensure the security, taking the advantages of the integrated functionality of encryption, key management, user authentication, firewall, and certificate authority with low cost. Several novel techniques are adopted in the VPN: 1) An effective chaotic encryption algorithm by using Logistic chaotic mapping; 2) a chaos theory based user’s “fingerprint” authentication algorithm by using mixed optically bistable chaotic model; 3) a reliable authentication mechanism by integrated Guillou-Quisquater digital signature with RSA encryption; 4) an efficient Certificate Authority (CA) and digit certificate mechanism. The details of the VPN are also presented, including a cryptography server, an auditing server, a digital signature server and an authenticating server.

The work was supported by the Fok Ying Tung Education Foundation and the National 863/CIMS Research Grant No. 863-511-946-003.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. L.M. Camarinha-Matos, H. Afsarmanesh, C. Garita, C. Lima, Towards an architecture for virtual enterprises, Journal of Intelligent Manufacturing„ 9(2), Apr. 1998, pp. 189–199.

    Google Scholar 

  2. O. Richard, A. Zarli. WONDA: An Architecture for Business Objects in Virtual Enterprise. Proc. of OOPSLA’98 Workshop on Objects, Components & VE, Vancouver, 1998.

    Google Scholar 

  3. E. Rdeke, J. Korzonnek, Distributed Information Management in Virtual Engineering Enterprise by GEN, Proc. of the 9th Intl Workshop on Research Issues on Data Engineering Information Technology for Virtual Enterprises, Sydney, 1999.

    Google Scholar 

  4. A.D. Rubin, D. Geer, A Survey of Web Security, IEEE Computer, 1998, 31(9).

    Google Scholar 

  5. P.W. Dowd, J.T. Mchenry, Network Security: It is Time to Take it Seriously, IEEE Computer, 1998, 31(9): pp. 24–28.

    Google Scholar 

  6. Tina Bird, Building VPNs: The 10-POINT PLAN, Data Communication, Jun. 1998, pp. 123–130.

    Google Scholar 

  7. X. Yang, G. Wang, G. Yu, D. Lee, Modeling Enterprise Objects in a Virtual Enterprise Integrating System, Lecture Notes in Computer Science 1749, pp. 166–175.

    Google Scholar 

  8. M.S. Baptista, Cryptography with Chaos, Physics Letters A 240(1998), pp. 50–54.

    Article  MATH  MathSciNet  Google Scholar 

  9. H. Zhang, J. Dai, P. Wang. Bifurcation and Chaos in an Optically Bistable Liquid-Crystal Device. Journal of Optical Soc Am B, 1986, 3(2).

    Google Scholar 

  10. L. Wang, Y. Hamazaki, Design of New Encryption and Authentication Model For Distributed Network Environment Using Object-Oriented Approach, Proc. of ICYCS’99, Aug. 1999, Nanjing.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, L. et al. (2000). A Virtual Private Network for Virtual Enterprise Information Systems. In: Lu, H., Zhou, A. (eds) Web-Age Information Management. WAIM 2000. Lecture Notes in Computer Science, vol 1846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45151-X_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-45151-X_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67627-0

  • Online ISBN: 978-3-540-45151-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics