[go: up one dir, main page]

Pitkäranta, 2010 - Google Patents

Päätelaitteen eheyteen pohjautuva verkon pääsynvalvonta-Teollisuusstandardit ja kaupalliset toteutukset

Pitkäranta, 2010

View PDF
Document ID
3616416386529763315
Author
Pitkäranta M
Publication year

External Links

Snippet

Tietoturva on keskeinen osa nykyaikaista verkkosuunnittelua. Perinteisesti tietoturvaa on pyritty parantamaan käyttämällä mm. verkkojen segmentointia, palomuureja sekä erilaisia IDS/IPS-järjestelmiä. Ongelma nykypäivän organisaatioissa on yhä enemmän ja enemmän …
Continue reading at aaltodoc.aalto.fi (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US10630725B2 (en) Identity-based internet protocol networking
US12309159B2 (en) TLS policy enforcement at a tunnel gateway
US9723019B1 (en) Infected endpoint containment using aggregated security status information
US8281371B1 (en) Authentication and authorization in network layer two and network layer three
CN109964196B (en) Multi-factor authentication as a web service
CN104813328B (en) trusted container
US7703126B2 (en) Hierarchical trust based posture reporting and policy enforcement
US20230009167A1 (en) Post-connection client certificate authentication
CN103875207A (en) Identification and authentication of network users
Bui et al. Client-side vulnerabilities in commercial vpns
CA3060232A1 (en) Computing system operational methods and apparatus
Nife et al. New SDN-oriented authentication and access control mechanism
Mutabazi et al. Investigating the challenges companies in Rwanda face when implementing zero-trust network
Pitkäranta Päätelaitteen eheyteen pohjautuva verkon pääsynvalvonta-Teollisuusstandardit ja kaupalliset toteutukset
Pitkäranta Network Access Control Based on Endpoint Integrity-Industry Standards and Commercial Implementations Date: 1.2. 2010 Language: English Number of pages: 10+ 64 Department: Department of Communications and Networking Professorship: Networking Technology Code: S-38
Serrao Network access control (NAC): An open source analysis of architectures and requirements
Tian et al. Network security and privacy architecture
Bente et al. Interoperable Remote Attestation for VPN Environments: (Work in Progress)
Agyare et al. Secure Remote Network Management and Network Access Control, the Case of University of Education-kumasi Campus
Detken et al. Leveraging trusted network connect for secure connection of mobile devices to corporate networks
von Helden et al. Trusted network connect (TNC)
Parker et al. Numbers and Symbols
Frank Securing Smart Homes with OpenFlow: Feasibility, Implementation, and Performance
Helfrich et al. Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design
Fisher Network access control: Disruptive technology?