Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure

@inproceedings{Hayes2000PolicybasedAA,
  title={Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure},
  author={Jeff Hayes},
  booktitle={ACSAC},
  year={2000}
}
A gaping hole in many of today’s networks is the weak security surrounding the network devices themselves--the routers, the switches, and the access servers. In all public networks and in some private networks, the network devices are shared virtually among different user communities. Access to the configuration schemes and command lines is most often an “all or nothing” proposition--the network administrator gets either readonly privileges or read / write privileges. In this case… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.

The Burton Group; various Network Strategy Reports

  • The Burton Group; various Network Strategy…
  • 1999

Similar Papers

Loading similar papers…