Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,270,933 papers from all fields of science
Search
Sign In
Create Free Account
Network Access Control
Known as:
NAC
Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
25 relations
Antivirus software
Authentication
Captive portal
Computer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Network Access Control List (ACL) YANG Data Model
K. Sreenivasa
,
Dana Blair
,
Lisa Huang
,
D. Bogdanovic
2014
Corpus ID: 63347413
This document defines a data model for Access Control List (ACL). An ACL is a user-ordered set of rules, used to configure the…
Expand
2014
2014
Next Generation Public Safety and Emergency Technologies
C. Bonde
,
R. Tadayoni
,
K. Skouby
2014
Corpus ID: 110225984
The paper researches the existing European standards for Public Safety and Emergency (PSE) services (also called Public…
Expand
2013
2013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
Fengjun Li
,
Bo Luo
,
Peng Liu
,
Dongwon Lee
,
C. Chu
IEEE Transactions on Information Forensics and…
2013
Corpus ID: 6705335
Today's organizations raise an increasing need for information sharing via on-demand access. Information brokering systems (IBSs…
Expand
2012
2012
Bio-inspired and Voronoi-based algorithms for self-positioning autonomous mobile nodes
Jianmin Zou
,
Janusz Kusyk
,
M. U. Uyar
,
S. Gundry
,
C. Sahin
IEEE Military Communications Conference
2012
Corpus ID: 7901995
We introduce two new self-positioning techniques for autonomous nodes in a mobile ad hoc network to spread over unknown two…
Expand
2010
2010
The Security Research of Network Access Control System
Zhao Jianguang
,
Li Jianchen
,
Fan Jingjing
,
Di Juxing
First ACIS International Symposium on…
2010
Corpus ID: 18674856
In this paper, Network access control system structure and network security technologies are commonly used research. On this…
Expand
2010
2010
Mitigation of Application Traffic DDoS Attacks with Trust and AM Based HMM Models
2010
Corpus ID: 1492763
26 ABSTRACT The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt…
Expand
2010
2010
Analysis of Handover Key Management schemes under IETF perspective
R. López
,
Y. Ohba
,
F. Pereñíguez-García
,
A. Gómez-Skarmeta
Comput. Stand. Interfaces
2010
Corpus ID: 44574421
2008
2008
Effects of Biodiesel Operation on Light-Duty Tier 2 Engine and Emission Control Systems
M. Tatur
,
H. Nanjundaswamy
,
D. Tomazic
,
M. Thornton
2008
Corpus ID: 55755377
This paper documents the impact of biodiesel blends on engine-out emissions as well as overall system performance in terms of…
Expand
Highly Cited
2006
Highly Cited
2006
In-broker access control: towards efficient end-to-end performance of information brokerage systems
Fengjun Li
,
Bo Luo
,
+4 authors
C. Chu
Sensor Networks, Ubiquitous, and Trustworthy…
2006
Corpus ID: 10162254
An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold…
Expand
2004
2004
State based key hop protocol: a lightweight security protocol for wireless networks
S. Michell
,
K. Srinivasan
ACM International Workshop on Performance…
2004
Corpus ID: 16685963
State Based Key Hop (SBKH) protocol provides a strong, lightweight encryption scheme for battery operated devices, such as the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE