Study of Network Access Control System Featuring Collaboratively Interacting Network Security Components


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Draw lessons from Cisco network access control thought, proposed one kind based on the 802.1x protocol of a network component security interaction type network access control system design and implementation, and to the large campus network application background and describes in detail the development and deployment of technology of the system, including identity authentication, billing, network access control, information statistics safety linkage, form a variety of different network components linkage collaboration, the traditional first connection security evaluation network access mode changes for the first safety assessment after connection, significantly improve the security of network.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


802.1x; NAC; Network Access Control; Network Security

Full Text:

PDF


References


Kun Wu, Zhongying Bai, "A Usage Authorization Model with Time Constraint based on TNC", IJACT: International Journal of Advancements in Computing Technology, Vol. 3, No. 7, pp. 264 ~ 272, 2011.

Manoj Kumar Mishra , Binod Kumar Pattanayak , Alok Kumar Jagadev, Manoj Ranjan Nayak, "Self-Centric Protected Ad-Hoc Networks ", IJACT: International Journal of Advancements in Computing Technology, Vol. 1, No. 2, pp. 110 ~ 121, 2009.

F. R. Armaghani, S. Khatun, S. S. Jamuar, M. F. A. Rasid, TCP Throughput Optimization Over 802.11 MAC Protocol in Multi-hop Ad-hoc Networks, (2008) International Review on Computers and Software (IRECOS), 3 (4), pp. 356 - 362.

Zhang Shibin, Xu Chunxiang, Chang Yan, Yan Lili, "Study on Trusted Access Model Based on User Behavior", IJACT: International Journal of Advancements in Computing Technology, Vol. 5, No. 1, pp. 486 ~ 495, 2013.

Scott Stark. JBoss Administration and Development 3.2.x Third Edition. Scott Stark and The JBoss Group, June, 2003.

Anony, "Integrated JBoss middleware management platform", web: http://developer.51cto.com/art/200906/129705.htm, Accessed on June 10 2012.

Jianhong Mao, Jun Xiang, Kai Gong, "Research on the Stability of Minor Radius Continuous Welded Rail with New Guard Rail Structure", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 8, pp. 239 ~ 247, 2012.

Mala Umar Mustapha Bakura Sun Songlin Jing Xiaojun, Huang Hai, "Improved Increase Radius Search Mode of Sphere Decoding Algorithm with Probabilistic Promising Path", AISS: Advances in Information Sciences and Service Sciences, Vol. 4, No. 7, pp. 113 ~ 120, 2012.

Weiwei Fang, Zhen Liu, Xiangmin Liang, Feng Liu, Shi Huang, Liming Li, "Research and Implementation of an AAA System for Railway WiMAX Communication Networks", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 5, No. 9, pp. 238 ~ 246, 2011.

Ming-Chang Lee, Jung-Fang Cheng, "Development Multi-Enterprise Collaborative Enterprise intelligent decision support system", JCIT: Journal of Convergence Information Technology, Vol. 2, No. 2, pp.69 ~ pp.74, 2007.

Zhanfei Ma, Shuying Yang, Zenggang Xiong, "Immuno-inspired Security Defense Mechanisms for Computer Systems", JCIT: Journal of Convergence Information Technology, Vol. 7, No. 2, pp. 192 ~ 200, 2012.

Chen, R., Zhou, J., Liu, C., Zhang, Y., A novel detection model for network attack inspired by immunology, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2927-2932.

Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize