A virtual private network for virtual enterprise information systems

  • Lina Wang
  • , Ge Yu
  • , Guoren Wang
  • , Xiaochun Yang
  • , Dan Wang
  • , Xiaomei Dong
  • , Daling Wang
  • , Zhe Mei

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The security requirements of a virtual enterprise information system are investigated and a virtual private network (VPN) is designed to ensure the security, taking the advantages of the integrated functionality of encryption, key management, user authentication, firewall, and certificate authority with low cost. Several novel techniques are adopted in the VPN: 1) An effective chaotic encryption algorithm by using Logistic chaotic mapping; 2) a chaos theory based user’s “fingerprint” authentication algorithm by using mixed optically bistable chaotic model; 3) a reliable authentication mechanism by integrated Guillou-Quisquater digital signature with RSA encryption; 4) an efficient Certificate Authority (CA) and digit certificate mechanism. The details of the VPN are also presented, including a cryptography server, an auditing server, a digital signature server and an authenticating server.

Original languageEnglish
Title of host publicationWeb-Age Information Management - 1st International Conference, WAIM 2000, Proceedings
EditorsHongjun Lu, Aoying Zhou
PublisherSpringer Verlag
Pages165-176
Number of pages12
ISBN (Print)9783540676270
DOIs
Publication statusPublished - 2000
Externally publishedYes
Event1st International Conference on Web-Age Information Management, WAIM 2000 - Shanghai, China
Duration: 21 Jun 200023 Jun 2000

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1846
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Web-Age Information Management, WAIM 2000
Country/TerritoryChina
CityShanghai
Period21/06/0023/06/00

Fingerprint

Dive into the research topics of 'A virtual private network for virtual enterprise information systems'. Together they form a unique fingerprint.

Cite this