A VPN protocol similar to PPTP.
A VPN protocol similar to PPTP and L2F.
Local area network.
A method for implementing mandatory access controls in which a mathematical structure defines greatest lower-bound and least upper-bound values for a pair of elements: for example, subject and object.
An IP protocol and data storage model that supports authentication and directory functions.
A principle requiring that a subject is granted only the minimum privileges necessary to perform an assigned task.
Packet encryption and decryption at every node along the network path. Requires each node to have separate key pairs for its upstream and downstream neighbors.
A program, or portion thereof, that is designed to perform some malicious function given the realization of a predetermined circumstance.