书目名称 | Information Systems Security |
副标题 | 5th International Co |
编辑 | Atul Prakash,Indranil Sen Gupta |
视频video | http://file.papertrans.cn/466/465532/465532.mp4 |
丛书名称 | Lecture Notes in Computer Science |
图书封面 |  |
描述 | The management of services and operations in today’s organizations are - coming increasingly dependent on their enterprise local area network (enterprise LAN). An enterprise LAN consists of a set of network zones (logical group of networkelements)correspondingto di?erent departments orsections,connected through various interface switches (typically, Layer-3 switches). The network service accesses between these zones and also with the external network (e. g. , Internet) are governed by a global network security policy of the organization. This global policy is de?ned as a collection of service access rules across various network zones where the services referred network applications conforming to TCP/IP protocol. For example, some of the known network services aressh, t- net,http etc. In reality, the security policy may be incompletely speci?ed; which explicitly states the “permit” and “deny” access rules between speci?c network zones keeping remaining service access paths as unspeci?ed. The global security policy is realized in the network by con?guring the n- work interfaces with appropriate sets of access control rules (ACLs). One of the major challenges in network security manag |
出版日期 | Conference proceedings 2009 |
关键词 | Radio-Frequency Identification (RFID); access control; authentication; authorization; biometric; biometri |
版次 | 1 |
doi | https://doi.org/10.1007/978-3-642-10772-6 |
isbn_softcover | 978-3-642-10771-9 |
isbn_ebook | 978-3-642-10772-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 |
issn_series | 0302-9743 |
copyright | Springer-Verlag Berlin Heidelberg 2009 |