{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:00Z","timestamp":1725558960327},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540241263"},{"type":"electronic","value":"9783540305613"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30561-3_9","type":"book-chapter","created":{"date-parts":[[2010,7,2]],"date-time":"2010-07-02T15:29:02Z","timestamp":1278084542000},"page":"76-86","source":"Crossref","is-referenced-by-count":0,"title":["Design and Deployment of IP Virtual Private Networks: A Case Study"],"prefix":"10.1007","author":[{"given":"Chittaranjan","family":"Hota","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G.","family":"Raghurama","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Fox, B., Gleeson, B.: Virtual Private Network Identifier. RFC 2685 (September 1999)","DOI":"10.17487\/rfc2685"},{"key":"9_CR2","unstructured":"McDysan, D.: VPN Applications Guide. John Wiley & Sons, Inc. Chichester"},{"key":"9_CR3","unstructured":"Davis, C.R.: IPSec Securing VPNs. Tata McGraw-Hill, New York"},{"key":"9_CR4","unstructured":"Quiggle, A.: Implementing CISCO VPNs. McGraw-Hill, New York"},{"key":"9_CR5","unstructured":"Perlmutter, B.: Virtual Private Networks: A View from Trenches. The Prentice Hall PTR, Englewood Cliffs"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Kumar, A., Rastogi, R., Silberchatz, A.: Algorithms for Provisioning VPNs in the Hose Model. IEEE\/ ACM Transactions on Networking (August 2002)","DOI":"10.1109\/TNET.2002.802141"},{"key":"9_CR7","unstructured":"Zeng, J., Ansari, N.: Toward IP Virtual Private Network Quality of Service: A Service Provider Perspective. IEEE Communications Magazine (April 2003)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Patton, B., Smith, D.: A Layered Framework for Deploying High Assurance VPNs. In: Proceedings of HASE 2000 (2000)","DOI":"10.1109\/HASE.2000.895461"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Maresca, R., Arienzo, M., Esposito, R., Ventre, G.: An Active Network approach to Virtual Private Networks. In: IEEE International Symposium on Computers and Communications, Taormina, Italy (July 2002)","DOI":"10.1109\/ISCC.2002.1021722"},{"key":"9_CR10","unstructured":"Korzeniowski, P.: VPNs become Key Part of Enterprise Networks. Business Communications Review, 28\u201332 (March 2000)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Duffield, N., Goyal, P., Greenberg, M., Ramakrishnan: A Flexible Model for Resource Management in Virtual Private Networks. ACM Comp. Comm. Rev.\u00a029(4), 95\u2013108","DOI":"10.1145\/316194.316209"},{"key":"9_CR12","unstructured":"Hota, C., Raghurama, G.: A Heuristic Algorithm for QoS Path Computation in VPNs. In: International Conference on Information Technology, Bhubaneswar, India (December 2003)"},{"key":"9_CR13","unstructured":"Hota, C., Raghurama, G.: Building Virtual Private Networks to Support Mobile VPN Users in a Group with Quality of Service Guarantees. In: International Conference on Electronic Business, NUS, Singapore (December 2003)"},{"key":"9_CR14","unstructured":"Juttner, Szabo, Szentesi: On Bandwidth Efficiency of the Hose Resource Management Model in VPNs. IEEE INFOCOM (2003)"},{"key":"9_CR15","volume-title":"Implementing Virtual Private Networks","author":"S. Brown","year":"2000","unstructured":"Brown, S.: Implementing Virtual Private Networks. Tata McGraw-Hill, New York (2000)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30561-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:22:28Z","timestamp":1605741748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30561-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540241263","9783540305613"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30561-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}