R
EFERENCES
[1] J. Y. Lee, J. W. Lee, D. W. Cheun, and S. D. Kim, “A quality model for
evaluating software-as-a-service in cloud computing,” in
Software Engineering
Research, Management and Applications, 2009. SERA’09. 7th ACIS
International Conference on
, 2009, pp. 261–266.
[2] B. Han, V. Gopalakrishnan, L. Ji, and S. Lee, “Network function virtualization:
Challenges and opportunities for innovations,”
Commun. Mag. IEEE
, vol. 53, no.
2, pp. 90–97, 2015.
[3] F. Lombardi and R. Di Pietro, “Secure virtualization for cloud computing,”
J.
Netw. Comput. Appl.
, vol. 34, no. 4, pp. 1113–1122, 2011.
[4] M. Forsman, A. Glad, L. Lundberg, and D. Ilie, “Algorithms for automated live
migration of virtual machines,”
J. Syst. Softw.
, vol. 101, pp. 110–126, 2015.
[5] A. A. Alsaheel and A. S. Almogren, “A Powerful IPSec Multi-Tunnels
Architecture,”
J. Adv. Comput. Netw.
, vol. 2, no. 4, 2014.
[6] W.-H. Liao and S.-C. Su, “A Dynamic VPN Architecture for Private Cloud
Computing,” in
Utility and Cloud Computing (UCC), 2011 Fourth IEEE
International Conference on
, 2011, pp. 409–414.
[7] D. Shinder, “Comparing VPN Options,”
WindowSecurity.com
. [Online].
Available:http://www.windowsecurity.com/articles-
tutorials/firewalls_and_VPN/VPN-Options.html. [Accessed: 03-Sep-2015].
[8] “Advantages and Disadvantages of IPsec - Best,”
VPN Services Reviews
. .
[9] L. Andersson and T. Madsen, “Provider provisioned virtual private network
(VPN) terminology,” 2005.
[10]“9 top threats to cloud computing security,”
InfoWorld
, 25-Feb-2013. [Online].
Available:
http://www.infoworld.com/article/2613560/cloud-security/cloud-
security-9-top-threats-to-cloud-computing-security.html. [Accessed: 03-Sep-
2015].
[11]“Data Protection In The Cloud Era,”
Network Computing
. [Online]. Available:
http://www.networkcomputing.com/cloud-computing/data-protection-in-the-
cloud-era/240161485. [Accessed: 03-Sep-2015].
[12]B. Hoekstra, D. Musulin, and J. J. Keijser, “Comparing TCP performance of
tunneled and non-tunneled traffic using OpenVPN,”
Univ. Van Amst. Syst. Netw.
Eng. Amst.
, pp. 2010–2011, 2011.
[13]S. S. Kolahi, Y. R. Cao, and H. Chen, “Bandwidth-IPSec security trade-off in
IPv4 and IPv6 in Windows 7 environment,” in
Future Generation
Communication Technology (FGCT), 2013 Second International Conference on
,
2013, pp. 148–152.
[14]S. S. Kolahi, Y. Cao, and H. Chen, “Evaluation of IPv6 with IPSec in IEEE
802.11 n wireless LAN using Fedora 15 operating system,” in
Computers and
Communications (ISCC), 2013 IEEE Symposium on
, 2013, pp. 000203–000206.
[15]S. Srivatsan, M. L. Johnson, and S. M. Bellovin, “Simple-VPN: Simple IPsec
Configuration,” 2010.
[16]M. H. M. Zaharuddin, R. A. Rahman, and M. Kassim, “Technical comparison
analysis of encryption algorithm on site-to-site IPSec VPN,” in
Computer
Applications and Industrial Electronics (ICCAIE), 2010 International
Conference on
, 2010, pp. 641–645.
38
[17]C. J. C. Pena and J. Evans, “Performance evaluation of software virtual private
networks (VPN),” in
25th Annual IEEE Conference on Local Computer
Networks, 2000. LCN 2000. Proceedings
, 2000, pp. 522–523.
[18]A. Andelic, M. Koprivica, and B. Bozilovic, “Experimental performance
evaluation of VPN implemented with strongSwan client and Cisco IOS IPSec
gateway,” in
Do'stlaringiz bilan baham: |