A gaping hole in many of today's networks is the weak security surrounding the network devices themselves--the routers, the switches, and the access servers. In all public networks and in some private networks, the network devices are shared virtually among different user communities. Access to the configuration schemes and command lines is most often an “all or nothing” proposition--the network administrator gets either read-only privileges or read / write privileges. In this case, authentication equals authorization. Herein lies the problem. Security policies may mandate certain administrators have read-only capabilities for all device parameters and read / write capabilities for a certain subset of commands. Each administrator may h...
The evolution of technological progress continually presents new information security challenges for...
A major drawback of existing access control systems is that they have all been developed with a spec...
With the increasing digitization and interconnection of industry, there are many opportunities for n...
Both the size, and the interconnectivity of computer networks are increasing tremendously. However, ...
Maximizing local autonomy by delegating functionality to end nodes when possible (the end-to-end des...
In this paper we use Security Evaluation Criteria as basis to develop the Network access control mod...
Both the size, and the interconnectivity of computer networks are increasing tremendously. However, ...
Abstract. The ubiquitous computing paradigm suggests that we are going to be surrounded by countless...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
Enterprise networks are ubiquitious and increasingly complex. The mechanisms for defining security p...
System administrators specify the access control policy they want and implement the relevant configu...
This paper describes a security system for authorization in open networks. Authorization means autho...
In a typical enterprise network, there are several sub-networks or network zones corresponding to di...
Abstract: In the modern era of computers everyone is using computers and networks for their day to d...
International audienceThis paper addresses the consistency of initially heterogeneous access control...
The evolution of technological progress continually presents new information security challenges for...
A major drawback of existing access control systems is that they have all been developed with a spec...
With the increasing digitization and interconnection of industry, there are many opportunities for n...
Both the size, and the interconnectivity of computer networks are increasing tremendously. However, ...
Maximizing local autonomy by delegating functionality to end nodes when possible (the end-to-end des...
In this paper we use Security Evaluation Criteria as basis to develop the Network access control mod...
Both the size, and the interconnectivity of computer networks are increasing tremendously. However, ...
Abstract. The ubiquitous computing paradigm suggests that we are going to be surrounded by countless...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
Enterprise networks are ubiquitious and increasingly complex. The mechanisms for defining security p...
System administrators specify the access control policy they want and implement the relevant configu...
This paper describes a security system for authorization in open networks. Authorization means autho...
In a typical enterprise network, there are several sub-networks or network zones corresponding to di...
Abstract: In the modern era of computers everyone is using computers and networks for their day to d...
International audienceThis paper addresses the consistency of initially heterogeneous access control...
The evolution of technological progress continually presents new information security challenges for...
A major drawback of existing access control systems is that they have all been developed with a spec...
With the increasing digitization and interconnection of industry, there are many opportunities for n...