Pitkäranta, 2010 - Google Patents
Päätelaitteen eheyteen pohjautuva verkon pääsynvalvonta-Teollisuusstandardit ja kaupalliset toteutuksetPitkäranta, 2010
View PDF- Document ID
- 3616416386529763315
- Author
- Pitkäranta M
- Publication year
External Links
Snippet
Tietoturva on keskeinen osa nykyaikaista verkkosuunnittelua. Perinteisesti tietoturvaa on pyritty parantamaan käyttämällä mm. verkkojen segmentointia, palomuureja sekä erilaisia IDS/IPS-järjestelmiä. Ongelma nykypäivän organisaatioissa on yhä enemmän ja enemmän …
- 238000005067 remediation 0 abstract description 61
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10630725B2 (en) | Identity-based internet protocol networking | |
US12309159B2 (en) | TLS policy enforcement at a tunnel gateway | |
US9723019B1 (en) | Infected endpoint containment using aggregated security status information | |
US8281371B1 (en) | Authentication and authorization in network layer two and network layer three | |
CN109964196B (en) | Multi-factor authentication as a web service | |
CN104813328B (en) | trusted container | |
US7703126B2 (en) | Hierarchical trust based posture reporting and policy enforcement | |
US20230009167A1 (en) | Post-connection client certificate authentication | |
CN103875207A (en) | Identification and authentication of network users | |
Bui et al. | Client-side vulnerabilities in commercial vpns | |
CA3060232A1 (en) | Computing system operational methods and apparatus | |
Nife et al. | New SDN-oriented authentication and access control mechanism | |
Mutabazi et al. | Investigating the challenges companies in Rwanda face when implementing zero-trust network | |
Pitkäranta | Päätelaitteen eheyteen pohjautuva verkon pääsynvalvonta-Teollisuusstandardit ja kaupalliset toteutukset | |
Pitkäranta | Network Access Control Based on Endpoint Integrity-Industry Standards and Commercial Implementations Date: 1.2. 2010 Language: English Number of pages: 10+ 64 Department: Department of Communications and Networking Professorship: Networking Technology Code: S-38 | |
Serrao | Network access control (NAC): An open source analysis of architectures and requirements | |
Tian et al. | Network security and privacy architecture | |
Bente et al. | Interoperable Remote Attestation for VPN Environments: (Work in Progress) | |
Agyare et al. | Secure Remote Network Management and Network Access Control, the Case of University of Education-kumasi Campus | |
Detken et al. | Leveraging trusted network connect for secure connection of mobile devices to corporate networks | |
von Helden et al. | Trusted network connect (TNC) | |
Parker et al. | Numbers and Symbols | |
Frank | Securing Smart Homes with OpenFlow: Feasibility, Implementation, and Performance | |
Helfrich et al. | Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design | |
Fisher | Network access control: Disruptive technology? |