28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings.
DOI: 10.1109/lcn.2003.1243164
|View full text |Cite
|
Sign up to set email alerts
|

Secure and manageable virtual private networks for end-users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…For maximum efficiency, we run one VM on each CPU of a physical node [8]. Virtual Routing [12], [15] allows for creating virtual nodes [9] by partitioning the operating system running inside the virtual machine. All virtual nodes running in the same VM share a common operating system.…”
Section: System Architecturementioning
confidence: 99%
“…For maximum efficiency, we run one VM on each CPU of a physical node [8]. Virtual Routing [12], [15] allows for creating virtual nodes [9] by partitioning the operating system running inside the virtual machine. All virtual nodes running in the same VM share a common operating system.…”
Section: System Architecturementioning
confidence: 99%
“…Based on these components, we are able to run the SUT in a controlled environment. Since our network emulation To increase the number of virtual nodes (hosts, routers, switches) in the emulated network we use a node virtualization system that is based on Virtual Routing (VR) [15]. As opposed to Virtual Machines (VM) [2], [3], [7], Virtual Routing provides more lightweight virtualization.…”
Section: System Architecturementioning
confidence: 99%
“…The IDS VMs were implemented by extending the portspace [15]. The portspace is not a heavy-weight VM that emulates hardware; rather, it provides only an independent namespace for a file system, a network system, and processes.…”
Section: Ids Vmmentioning
confidence: 99%
“…Here, we give an overview of the extended portspace. Further details of the implementation of the original portspace are described in [15].…”
Section: Ids Vmmentioning
confidence: 99%
See 1 more Smart Citation