{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:11:59Z","timestamp":1758892319879},"reference-count":26,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2002,2,1]],"date-time":"2002-02-01T00:00:00Z","timestamp":1012521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2002,2]]},"DOI":"10.1016\/s1389-1286(01)00256-0","type":"journal-article","created":{"date-parts":[[2002,10,10]],"date-time":"2002-10-10T15:00:31Z","timestamp":1034262031000},"page":"165-179","source":"Crossref","is-referenced-by-count":13,"title":["On virtual private networks security design issues"],"prefix":"10.1016","volume":"38","author":[{"given":"K.H.","family":"Cheung","sequence":"first","affiliation":[]},{"given":"J.","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(01)00256-0_BIB1","unstructured":"U. Blumenthal, B. Wijnen, User-based security model for version 3 of the simple network management protocol, Request for Comments from Network Working Group, no. 2274"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB2","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/35.920862","article-title":"Management of quality of service enabled vpns","author":"Braun","year":"2001","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S1389-1286(01)00256-0_BIB3","unstructured":"J. Case, D. Harrington, R. Presuhn, B. Wijnen, Message processing and dispatching for the simple network management protocol, Request for Comments from Network Working Group, no. 2272"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB4","unstructured":"CheckPoint Software Technologies Ltd, Product information available via http:\/\/www.checkpoint.com\/products\/firewall-1\/index.html"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB5","unstructured":"Cisco Systems, Inc., Product information available via http:\/\/www.cisco.com\/warp\/public\/cc\/cisco\/mkt\/security\/pix\/"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB6","unstructured":"Cisco Systems, Inc., Cisco L2F information available via http:\/\/www.cisco.com\/warp\/public\/728\/General\/vpdn_wp.htm"},{"issue":"8","key":"10.1016\/S1389-1286(01)00256-0_BIB7","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/358722.358740","article-title":"Timestamps in key distribution protocols","volume":"24","author":"Denning","year":"1981","journal-title":"Commun. ACM"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB8","unstructured":"Digital Equipment Corp., Product information available via http:\/\/www.altavista.software.digital.com\/tunnel\/index.asp"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB9","unstructured":"D. Harrington, R. Presuhn, B. Wijnen, An architecture for describing SNMP management frameworks, Request for Comments from Network Working Group, no. 2271"},{"issue":"3","key":"10.1016\/S1389-1286(01)00256-0_BIB10","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/49.917707","article-title":"Support for resource-assured and dynamic virtual private networks","volume":"19","author":"Isaacs","year":"2001","journal-title":"IEEE J. Selected Areas Commun."},{"key":"10.1016\/S1389-1286(01)00256-0_BIB11","unstructured":"S. Kent, R. Atkinson, IP authentication header, Request for Comments from Network Working Group, no. 2402"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB12","unstructured":"S. Kent, R. Atkinson, IP encapsulating security payload, Request for Comments from Network Working Group, no. 2406"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB13","unstructured":"S. Kent, R. Atkinson, Security architecture for the Internet protocol, Request for Comments from Network Working Group, no. 2401"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB14","unstructured":"D. Levi, P. Meyer, B. Stewart, SNMPv3 applications, Request for Comments from Network Working Group, no. 2273"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB15","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/S1389-1286(01)00173-6","article-title":"Customizable virtual private network service with QOS","volume":"36","author":"Lim","year":"2001","journal-title":"Comput. Networks"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB16","unstructured":"Microsoft Corporation, PPTP information available via http:\/\/www.microsoft.com\/communications\/PPTP.htm"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB17","unstructured":"D. Mills, Simple network time protocol version 4 for IPv4, IPv6 and OSI, Request for Comments from Network Working Group, no. 2030"},{"issue":"5","key":"10.1016\/S1389-1286(01)00256-0_BIB18","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/65.793693","article-title":"Performance analysis of an RSVP-capable router","volume":"13","author":"Neogi","year":"1999","journal-title":"IEEE Network"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB19","unstructured":"Optical Internetworking Forum Web Site. http:\/\/www.oiforum.com"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB20","unstructured":"M. Reiter, A secure group membership protocol, Symposium on Research in Security and Privacy, 1994"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB21","unstructured":"C. Scott, P. Wolfe, M. Erwin, Virtual Private Networks, O'Reilly, 1999"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB22","unstructured":"R. Stevens. UNIX Network Programming Volume 1, Prentice-Hall, New York, 1988"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB23","unstructured":"The ATM Forum Technical Committee, Remote monitoring MIB extensions for ATM networks, May 1997. Internet draft"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB24","unstructured":"S. Waldbusser, Remote network monitoring management information base version 2 using SMIv2, Request for Comments from Network Working Group, no. 2021"},{"key":"10.1016\/S1389-1286(01)00256-0_BIB25","unstructured":"B. Wijnen, R. Presuhn, K. McCloghrie, View-based access control model for the simple network management protocol, Request for Comments from Network Working Group, no. 2275"},{"issue":"5","key":"10.1016\/S1389-1286(01)00256-0_BIB26","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/65.238150","article-title":"RSVP: a new resource reservation protocol","volume":"7","author":"Zhang","year":"1993","journal-title":"IEEE Network"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128601002560?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128601002560?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T15:26:27Z","timestamp":1556465187000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128601002560"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,2]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,2]]}},"alternative-id":["S1389128601002560"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(01)00256-0","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2002,2]]}}}