Login / Signup
External Dynamic List and Middle Relay Tor for Internet Access Control in an Enterprise Network.
William-Rogelio Marchand-Niño
Jose-Manuel Bravo-Rengifo
Published in:
SCCC (2023)
Keyphrases
</>
access control
enterprise network
policy enforcement
security issues
security mechanisms
dynamic access control
data security
security policies
role based access control
access control models
access control policies
ip addresses
attack graph
privacy preserving
network access