Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure.
Jeff HayesPublished in: ACSAC (2000)
Keyphrases
- network infrastructure
- access control
- rbac model
- identity management
- security requirements
- access control policies
- security mechanisms
- password authentication
- trust negotiation
- role based access control
- wireless networks
- ad hoc networks
- access control mechanism
- security policies
- authentication protocol
- data security
- internet access
- user authentication
- smart card
- access requests
- tcp ip
- trust relationships
- network architecture
- communication networks
- multi hop
- mobile ad hoc networks
- conflict resolution
- distributed environment
- routing protocol
- factor authentication
- artificial neural networks
- mobile networks
- information security
- cloud computing
- sensor networks