ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Policy-driven network access control configuration management using XACML
Green Communications and Networks
◽
10.2495/gcn131462
◽
2014
◽
Author(s):
Si Shen
◽
XueJun You
Keyword(s):
Access Control
◽
Configuration Management
◽
Network Access
◽
Network Access Control
◽
Control Configuration
Start Chat
Download Full-text
Related Documents
Cited By
References
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
Proceedings of the 7th International Conference on Information Systems Security and Privacy
◽
10.5220/0010285305500557
◽
2021
◽
Author(s):
Florian Patzer
◽
Jürgen Beyerer
Keyword(s):
Access Control
◽
Semantic Representation
◽
Security Analysis
◽
Network Access
◽
Network Access Control
◽
Control Configuration
Start Chat
Download Full-text
A Comparative Study of Network Access Control and Software-Defined Perimeter
Proceedings of the 6th International Conference on Engineering & MIS 2020
◽
10.1145/3410352.3410754
◽
2020
◽
Author(s):
Rami Radwan Omar
◽
Tawfig M. Abdelaziz
Keyword(s):
Access Control
◽
Comparative Study
◽
Network Access
◽
Network Access Control
Start Chat
Download Full-text
ISO/IEC/IEEE International Standard - Telecommunications and exchange between information technology systems -- Requirements for local and metropolitan area networks--Part 1X: Port-based network access control AMENDMENT 2: YANG data model
10.1109/ieeestd.2020.9263413
◽
2020
◽
Keyword(s):
Information Technology
◽
Access Control
◽
Metropolitan Area
◽
Data Model
◽
Metropolitan Area Networks
◽
Network Access
◽
International Standard
◽
Network Access Control
◽
Systems Requirements
◽
Technology Systems
Start Chat
Download Full-text
Design and Research of a Large-Scale Network Access Control System with Hybrid Router Configuration
2008 3rd International Conference on Innovative Computing Information and Control
◽
10.1109/icicic.2008.216
◽
2008
◽
Cited By ~ 1
Author(s):
Wei Jiang
◽
Bin-Xing Fang
◽
Zhi-Hong Tian
◽
Hong-Li Zhang
Keyword(s):
Control System
◽
Access Control
◽
Large Scale
◽
Network Access
◽
Large Scale Network
◽
Network Access Control
◽
Scale Network
◽
Access Control System
Start Chat
Download Full-text
Design and implementation of lightweight network access control technique on wireless router
International Journal of Services Technology and Management
◽
10.1504/ijstm.2017.081879
◽
2017
◽
Vol 23
(1/2)
◽
pp. 101
Author(s):
Hyeji Heo
◽
Jaecheol Ryou
Keyword(s):
Access Control
◽
Control Technique
◽
Network Access
◽
Design And Implementation
◽
Wireless Router
◽
Network Access Control
Start Chat
Download Full-text
IEEE/ISO/IEC International Standard-Telecommunications and exchange between information technology systems--Requirements for local and metropolitan area networks--Part 1X:Port-based network access control
10.1109/ieeestd.2021.9650828
◽
2021
◽
Keyword(s):
Information Technology
◽
Access Control
◽
Metropolitan Area
◽
Metropolitan Area Networks
◽
Network Access
◽
International Standard
◽
Network Access Control
◽
Systems Requirements
◽
Technology Systems
Start Chat
Download Full-text
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN '04
◽
10.1145/1029102.1029105
◽
2004
◽
Cited By ~ 27
Author(s):
Stanislaw Jarecki
◽
Nitesh Saxena
◽
Jeong Hyun Yi
Keyword(s):
Access Control
◽
Ad Hoc Network
◽
Ad Hoc
◽
Signature Scheme
◽
Network Access
◽
Control Protocol
◽
Network Access Control
Start Chat
Download Full-text
Security analysis of network access control implementations
Reliability, Risk, and Safety
◽
10.1201/9780203859759.ch263
◽
2009
◽
Author(s):
F Cetin
◽
P Oechslin
◽
T Dagonnier
Keyword(s):
Access Control
◽
Security Analysis
◽
Network Access
◽
Network Access Control
Start Chat
Download Full-text
Behavior-Based Network Access Control: A Proof-of-Concept
Lecture Notes in Computer Science - Information Security
◽
10.1007/978-3-540-85886-7_12
◽
2008
◽
pp. 175-190
◽
Cited By ~ 8
Author(s):
Vanessa Frias-Martinez
◽
Salvatore J. Stolfo
◽
Angelos D. Keromytis
Keyword(s):
Access Control
◽
Proof Of Concept
◽
Network Access
◽
Network Access Control
◽
Behavior Based
Start Chat
Download Full-text
FlowIdentity: Software-defined network access control
2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN)
◽
10.1109/nfv-sdn.2015.7387415
◽
2015
◽
Cited By ~ 11
Author(s):
Sadiq T. Yakasai
◽
Chris G. Guy
Keyword(s):
Access Control
◽
Software Defined Network
◽
Network Access
◽
Network Access Control
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close