Almis Marmoucha, Morocco
Almis Marmoucha, Morocco

Time filter

Source Type

Difaa S.,University Hasan Mohammedia | Azouazi M.,University Hasan Mohammedia | Marzak A.,University Hasan Mohammedia
Contemporary Engineering Sciences | Year: 2013

The data transmitted over the Internet is much more vulnerable than when running on an internal network in an organization. A good compromise is to use the Internet as a transmission medium using a protocol that transmits encrypted data. This is known as virtual private network (VPN Virtual Private Network). The VPN system therefore provides a secure connection at a lower cost, and based on an encapsulation protocol (tunneling) IPSec (Internet Protocol Security) uses cryptographic protection services, security protocols, and dynamic key management, these foundations ensure both power and flexibility for secure communications among computers of this network. In this paper we study the problem of robust optimization design of VPNs to solve the problem of bandwidth saturation. We formulate mathematical models of the problem and propose efficient heuristics based on local search techniques for solving. © 2013 Sanaa Difaa et al.


Difaa S.,University Hasan Mohammedia | Azouazi M.,University Hasan Mohammedia
Contemporary Engineering Sciences | Year: 2013

In information technology, trying to define virtualization as a set of technical hardware and / or software that can run on a single machine multiple operating systems and / or multiple applications separately from each other, as if they operated on separate physical machines. The approach to maximize resources on a single platform using virtual machines has been proven. In this paper we study the design and implementation of VPN services in a centralized way to manage and secure these services. © 2013 Sanaa Difaa and Mohamed Azouazi.

Loading University Hasan Mohammedia collaborators
Loading University Hasan Mohammedia collaborators