YANG Nan, WANG Yunli, YANG Tao,et al. Research on information infrastructure of virtual enterprise[J]. Computer Integrated Manufacturing Systems, 2002,8(3):182-186 (in Chinese).[杨楠,王云莉,杨涛,等.虚拟企业信息基础设施框架研究[J].计算机集成制造系统,2002,8(3):182-186.]
[2]
TANG Sanping, CHEN Xingshu, et al. Technical framework of VPN[J].Journal of Sichuan University(Natural Science Edition), 2002, 39(1):44-48 (in Chinese).[唐三平,陈兴蜀,等.VPN框架技术研究[J].四川大学学报(自然科学版),2002, 39(1):44-48.]
[3]
Permeo Technologes,Inc..Solving NAT and private IP problems[R]. 2001.
[4]
An NEC systems laboratory white paper, SOCKS5 border control framework[R]. 1998.
[5]
CHEN X S, ZHAO Z L, SHEN C X. By using embedding way achieves transparent proxy[A]. The 17th IEEE Region 10 International Conference on Computers, Communications, Control and Power Engineering[C]. 2002.228-231.
[6]
DAVID H C. Standand for the format of ARPA Internet text messages (RFC822)[Z].1982.
[7]
SANDHU R S, COYNE E J. Role-based access control models[J]. IEEE Computer, 1996,29(2):38-47.