메뉴 건너뛰기




Volumn , Issue , 2007, Pages 44-51

The dynamic endpoint-based access control model on VPN

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CONTROL SYSTEMS; SECURITY SYSTEMS;

EID: 47749116044     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NAS.2007.53     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 0037319591 scopus 로고    scopus 로고
    • On the establishment of an access VPN in broadband access networks
    • R. Cohen. On the establishment of an access VPN in broadband access networks. Communications Magazine, IEEE, 41(2): 156-163. 2003.
    • (2003) Communications Magazine, IEEE , vol.41 , Issue.2 , pp. 156-163
    • Cohen, R.1
  • 3
    • 33645650470 scopus 로고    scopus 로고
    • An application-layer based centralized information access control for VPN
    • Feb
    • Kai Ouyang, Jingli Zhou, Tao Xia and Shengsheng Yu, An application-layer based centralized information access control for VPN. Journal of Zhejiang University (SCIENCE A), Feb. 2006, 7(2): 240-249.
    • (2006) Journal of Zhejiang University (SCIENCE A , vol.7 , Issue.2 , pp. 240-249
    • Ouyang, K.1    Zhou, J.2    Xia, T.3    Yu, S.4
  • 5
    • 0242456725 scopus 로고    scopus 로고
    • Dynamic and Risk-Aware Network Access Management
    • Como, Italy, Jun 2-3
    • Lawrence Teo, Gail-Joon Ahn, and Yuliang Zheng. Dynamic and Risk-Aware Network Access Management. In Proc. of ACM SACMAT'02, Como, Italy, Jun 2-3, 2003, pp. 217-230.
    • (2003) Proc. of ACM SACMAT'02 , pp. 217-230
    • Teo, L.1    Ahn, G.-J.2    Zheng, Y.3
  • 6
    • 33746486109 scopus 로고    scopus 로고
    • A role and context based security model. Technical Report UCAM-CL-TR-558, Computer Laboratory of the University of Cambridge, United Kingdom
    • Jan
    • Y. Beresnevichiene. A role and context based security model. Technical Report UCAM-CL-TR-558, Computer Laboratory of the University of Cambridge, United Kingdom, Jan 2003.
    • (2003)
    • Beresnevichiene, Y.1
  • 7
    • 0035791053 scopus 로고    scopus 로고
    • Securing context-aware applications using environment roles
    • Chantilly, Virginia, USA, May 3-4
    • M.J. Covington, Wende Long, S. Srinivasan, et al. Securing context-aware applications using environment roles. In Proc. of Sixth ACM SACMAT'01, Chantilly, Virginia, USA, May 3-4 2001, pp. 10-20.
    • (2001) Proc. of Sixth ACM SACMAT'01 , pp. 10-20
    • Covington, M.J.1    Long, W.2    Srinivasan, S.3
  • 9
    • 4143056247 scopus 로고    scopus 로고
    • A Flexible and Dynamic Access Control Policy Framework for an Active Networking Environment
    • Leipzig, Germary, Feb 25-28
    • A. Hess and G. Schäfer. A Flexible and Dynamic Access Control Policy Framework for an Active Networking Environment. In Proc. of Kommunikation in Verteiten Sysemen (KivS 2003), Leipzig, Germary, Feb 25-28, 2003, pp. 321-333.
    • (2003) Proc. of Kommunikation in Verteiten Sysemen (KivS , pp. 321-333
    • Hess, A.1    Schäfer, G.2
  • 11
    • 47749104324 scopus 로고    scopus 로고
    • T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC2246, Jan 1999
    • T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC2246, Jan 1999.
  • 12
    • 0013197801 scopus 로고    scopus 로고
    • Generalized role based access control
    • Technical Report GIT-CC-00-16, College of Computing, Georgia Institute of Technology, Sep
    • Matthew J. Moyer and Mustaque Ahamad. Generalized role based access control. Technical Report GIT-CC-00-16, College of Computing, Georgia Institute of Technology, Sep 2000.
    • (2000)
    • Moyer, M.J.1    Ahamad, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.