Huawei Technologies Co., Ltd., 2022 - Google Patents
ACL and AAAHuawei Technologies Co., Ltd., 2022
View HTML- Document ID
- 5519570086973279823
- Author
- Huawei Technologies Co., Ltd.
- Publication year
- Publication venue
- Data Communications and Network Technologies
External Links
Snippet
ACL and AAA | SpringerLink Skip to main content Advertisement Springer Nature Link Account
Menu Find a journal Publish with us Track your research Search Cart 1.Home 2.Data
Communications and Network Technologies 3.Chapter ACL and AAA Chapter Open Access …
- 238000005516 engineering process 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrazani Mattos et al. | AuthFlow: authentication and access control mechanism for software defined networking | |
US8490153B2 (en) | Automatically generating rules for connection security | |
CN116601919A (en) | Dynamic optimization of client application access via the Secure Access Service Edge (SASE) Network Optimization Controller (NOC) | |
US10785196B2 (en) | Encryption key management of client devices and endpoints within a protected network | |
US12184484B1 (en) | Programmable switching device for network infrastructures | |
US10595320B2 (en) | Delegating policy through manufacturer usage descriptions | |
Bhaiji | Network security technologies and solutions (CCIE professional development series) | |
Keromytis et al. | The STRONGMAN architecture | |
EP4323898B1 (en) | Computer-implemented methods and systems for establishing and/or controlling network connectivity | |
Nife et al. | New SDN-oriented distributed network security system | |
CN114666341A (en) | Decentralized SDP controller implementation method and computer storage medium | |
Nife et al. | New SDN-oriented authentication and access control mechanism | |
Fiebig et al. | Learning from the past: designing secure network protocols | |
Naous et al. | Delegating network security with more information | |
Alsmadi | The integration of access control levels based on SDN | |
US7581241B2 (en) | Generating an outbound connection security policy based on an inbound connections security policy | |
Huawei Technologies Co., Ltd. | ACL and AAA | |
Seneviratne et al. | Integrated corporate network service architecture for bring your own device (BYOD) policy | |
EP1802071B1 (en) | Apparatuses and computer program for connecting a visitor's device to a network and enforcing a security policy based on the personalisation data | |
US10560478B1 (en) | Using log event messages to identify a user and enforce policies | |
Sahare et al. | A survey paper: Data security in local networks using distributed firewalls | |
Kelly et al. | Requirements for IPsec Remote Access Scenarios | |
Martins et al. | An Extensible Access Control Architecture for Software Defined Networks based on X. 812 | |
US20250247429A1 (en) | Command validation at an intermediary device | |
Piens | Mastering Palo Alto Networks |