A network solution for improved security for computer access.
Paul D. BloomPat DonnellyPublished in: ICCC (1988)
Keyphrases
- access control
- network structure
- network management
- security measures
- network administrators
- network access
- security protection
- information security
- security architecture
- security policies
- remote server
- network security
- computer systems
- forensic analysis
- denial of service attacks
- security threats
- network connection
- network services
- complex networks
- internet service providers
- enterprise network
- intrusion prevention
- buffer overflow
- wireless sensor networks
- trust relationships
- security problems
- cyber attacks
- cyber security
- security protocols
- key management
- computer networks
- network traffic
- peer to peer