2010
DOI: 10.1016/j.comnet.2009.11.019
|View full text |Cite
|
Sign up to set email alerts
|

SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…To pose obtain and maintain user contexts, who community cooperate with each other in independent context previously proposed maintain user contexts obtained from search users based on leverages Jitsi [10] and SocialVPN [11] The rest of the paper is organized as follows. In Section 2, we introduce two motivating examples, and in Section 3 we overview preliminary work.…”
Section: Overview Ofmentioning
confidence: 99%
See 1 more Smart Citation
“…To pose obtain and maintain user contexts, who community cooperate with each other in independent context previously proposed maintain user contexts obtained from search users based on leverages Jitsi [10] and SocialVPN [11] The rest of the paper is organized as follows. In Section 2, we introduce two motivating examples, and in Section 3 we overview preliminary work.…”
Section: Overview Ofmentioning
confidence: 99%
“…Such limitations lower efficiency, reduce the scope of applicable domains, and cause people to help through OSNs [8]. Overview of based cooperation model, and the community property bas some model resources To propose obtain and maintain user contexts, who community cooperate with each other in independent context previously proposed maintain user contexts obtained from search users based on leverages Jitsi [10] and SocialVPN [11] to guarantee unrestricted and cooperation. of Whistle Facebook, Twitter, and LinkedIn.…”
Section: Overview Ofmentioning
confidence: 99%
“…Since each user defines their own network, they can freely select IP addresses without fear of network subnet collisions. The datapath module performs IP packet translation on incoming packets which ensures no IP conflict following the approach described in previous work [27] …”
Section: Ip Addressing and Translationmentioning
confidence: 99%
“…Figure 2 illustrates VPN architecture. There are four tunneling protocols used to establish VPNs, and three are extensions of the Point-to-Point Protocol (PPP) [5,6,10,11]: 1) Point-to-Point Tunneling Protocol (PPTP). 2) Layer 2 Forwarding (L2F).…”
Section: Vpn Architecturesmentioning
confidence: 99%
“…In addition, Access control and intrusion detection [3,4] are not helpful against compromising of the authentication module. If a password is weak and has been compromised, access control and intrusion detection cannot prevent the loss or corruption of information that the compromised user was authorized to access, and also it is not helpful when the intruder uses the system and software bugs to compromise the integrity, confidentiality, or availability of resources [5,6].…”
Section: Introductionmentioning
confidence: 99%