In this paper we use Security Evaluation Criteria as basis to develop the Network access control model for enterprise wide network computing environment. The Network access control model addresses both the access control and information flow control requirements of the enterprise network system. The security architecture of the model attempts to ensure authorized access to network resources and secure flow of information between network entities. The underlying concept of the Network access control model relies on the separation of the access control mechanism from the access control policy. This enables support for multiple access control policies within a single model specification. A further advantage of Network Access control model is t...
The identification of the major information technology (IT) access control policies is required to d...
In a typical local area network (LAN), the global security policies, often defined in abstract form,...
In a typical enterprise network, correct implementation of security policies is becoming increasingl...
Enterprise networks are ubiquitious and increasingly complex. The mechanisms for defining security p...
In a typical enterprise network, there are several sub-networks or network zones corresponding to di...
The complex security constraints in present day enterprise networks (wired or wireless LAN) demand f...
This paper presents a formal model of the features, named security capabilities, offered by the cont...
The evolution of technological progress continually presents new information security challenges for...
Threats to network resources increase exponentially with the growth of the network/users and the tec...
In the area of computer network security, standardization work has been conducted for several years....
International audienceNetwork security constitutes a critical concern when developing and maintainin...
The first and primary law of network access control is to limit the access of network resources amon...
This master's thesis deals with the field of secure access to the local area computer network. The m...
AbstractOne of the most important characteristics of current enterprise systems is the existence of ...
International audienceNone of the classical access control models such as DAC, MAC, RBAC, TBAC or TM...
The identification of the major information technology (IT) access control policies is required to d...
In a typical local area network (LAN), the global security policies, often defined in abstract form,...
In a typical enterprise network, correct implementation of security policies is becoming increasingl...
Enterprise networks are ubiquitious and increasingly complex. The mechanisms for defining security p...
In a typical enterprise network, there are several sub-networks or network zones corresponding to di...
The complex security constraints in present day enterprise networks (wired or wireless LAN) demand f...
This paper presents a formal model of the features, named security capabilities, offered by the cont...
The evolution of technological progress continually presents new information security challenges for...
Threats to network resources increase exponentially with the growth of the network/users and the tec...
In the area of computer network security, standardization work has been conducted for several years....
International audienceNetwork security constitutes a critical concern when developing and maintainin...
The first and primary law of network access control is to limit the access of network resources amon...
This master's thesis deals with the field of secure access to the local area computer network. The m...
AbstractOne of the most important characteristics of current enterprise systems is the existence of ...
International audienceNone of the classical access control models such as DAC, MAC, RBAC, TBAC or TM...
The identification of the major information technology (IT) access control policies is required to d...
In a typical local area network (LAN), the global security policies, often defined in abstract form,...
In a typical enterprise network, correct implementation of security policies is becoming increasingl...