Quantifying the role of access control in end-to-end network security.
Usama AhmedAmmar MasoodLiaquat Ali KhanPublished in: ICUMT (2011)
Keyphrases
- end to end
- network security
- access control
- security policies
- role based access control
- access control systems
- computer networks
- intrusion detection
- intrusion detection system
- access control policies
- traffic analysis
- dynamic access control
- access control mechanism
- network traffic
- information security
- multipath
- congestion control
- wireless ad hoc networks
- security requirements
- security mechanisms
- network management
- anomaly detection
- application layer
- end hosts
- content delivery
- ad hoc networks
- ip networks
- knowledge discovery
- transport layer
- real world
- data mining
- data model
- file system