
6. Younglove, R., 2000. Virtual Private Networks: Secure Access for E-Business. IEEE
Internet Computing, pp. 96, Volume 4, Number 4.
7. Günter, M., 2001. Virtual Private Networks over the Internet. Available at
http://citeseer.nj.nec.com/480338.html.
8. Wright, M. A., 2000. Virtual Private Network Security. Network-Security, pp. 11-14, July
2000.
9. Network Working Group (Simpson, W., Editor), 1994. The Point-to-Point Protocol (PPP).
RFC 1661.
10. Boon, S., 2003. Delivering the Foundations for Joined up E-Government. Available at
http://www.publicnet.co.uk/publicnet/fe031021.htm
11. Boudriga N. and Obaidat, M. S., 2002. Driving Citizens to Information and
Communications Technology. Mediterranean Development Forum 4, October 2002.
12. Cohen, R., 2003. On the Establishment of an Access VPN in Broadband Access Networks.
IEEE Communications Magazine, pp. 156-163, February 2003.
13. Braun, T., Günter, M., Kasumi, M. and Khalil, I., 1999. Virtual Private Network
Architecture. CATI Project Deliverable, January 1999, available at
http://www.tik.ee.ethz.ch/~cati/deliverables.html.
14. Harding, A., 2003. SSL Virtual Private Networks. Computers & Security, Volume 22, Issue
5, pp. 416-420, July 2003.
15. Ribeiro S., Silva F. and Zuquete A., 2004. A Roaming Authentication Solution for Wifi
using IPSec VPNs with client certificates, TERENA Networking Conference, June 2004.
16. Srisuresh P. and Holdrege M., 1999. IP Network Address Translator (NAT) Terminology
and Considerations. RFC 2663.
17. Rosenbaum, G., Lau, W. and Jha, S., 2003. Recent directions in virtual private network
solutions. IEEE International Conference on Networks (ICON 2003), September 2003.
18. Gleeson, B., Lin, A, Heinanen, J., Armitage, G. and Malis, A., 2000. A Framework for IP
Based Virtual Private Networks. RFC 2764.
19. Pall, G., Verthein, W., Taarud, J., Little, W. and Zorn, G., 1999. Point-to-Point Tunneling
Protocol (PPTP). RFC 2637.
20. Hanks, S., Li, T., Farinacci, D. and Traina, P., 1994. Generic Routing Encapsulation (GRE),
RFC 1701.
21. Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G. and Palter, B., 1999. Layer Two
Tunneling Protocol. RFC 2661.
22. Yuan, R., 2002. The VPN Client and the Windows Operating System. January 2002.
Available online at: http://www.awprofessional.com/articles/
23. Rekhter Y., Watson T.J. and Li T., 1995. A Border Gateway Protocol 4 (BGP-4). RFC
1771.
24. Patel B., Aboba B., Dixon W., Zorn G. and Booth S., 2001. Securing L2TP using IPsec.
RFC 3193.
25. Tomsu P. and Wieser G., 2002. MPLS-Based VPNs – Designing Advanced Virtual
Networks, Prentice-Hall.
26. Zeng J. and Ansari N., 2003. Toward IP Virtual Private Network Quality of Service: A
Service Provider Perspective. IEEE Communications Magazine, pp. 113-119, April 2003.
27. Braun T., Guenter M. and Khalil I., 2001. Management of Quality of Service Enabled
VPNs. IEEE Communications Magazine, pp. 90-98, May 2001.
105