Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,761 papers from all fields of science
Search
Sign In
Create Free Account
Network Access Control
Known as:
NAC
Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
25 relations
Antivirus software
Authentication
Captive portal
Computer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Network Access Control List (ACL) YANG Data Model
K. Sreenivasa
,
Dana Blair
,
Lisa Huang
,
D. Bogdanovic
2014
Corpus ID: 63347413
This document defines a data model for Access Control List (ACL). An ACL is a user-ordered set of rules, used to configure the…
Expand
2014
2014
Next Generation Public Safety and Emergency Technologies
C. Bonde
,
R. Tadayoni
,
K. Skouby
2014
Corpus ID: 110225984
The paper researches the existing European standards for Public Safety and Emergency (PSE) services (also called Public…
Expand
2013
2013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
Fengjun Li
,
Bo Luo
,
Peng Liu
,
Dongwon Lee
,
C. Chu
IEEE Transactions on Information Forensics and…
2013
Corpus ID: 6705335
Today's organizations raise an increasing need for information sharing via on-demand access. Information brokering systems (IBSs…
Expand
2010
2010
The Security Research of Network Access Control System
Zhao Jianguang
,
Li Jianchen
,
Fan Jingjing
,
Di Juxing
First ACIS International Symposium on…
2010
Corpus ID: 18674856
In this paper, Network access control system structure and network security technologies are commonly used research. On this…
Expand
2010
2010
Mitigation of Application Traffic DDoS Attacks with Trust and AM Based HMM Models
2010
Corpus ID: 1492763
26 ABSTRACT The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt…
Expand
2008
2008
Effects of Biodiesel Operation on Light-Duty Tier 2 Engine and Emission Control Systems
M. Tatur
,
H. Nanjundaswamy
,
D. Tomazic
,
M. Thornton
2008
Corpus ID: 55755377
This paper documents the impact of biodiesel blends on engine-out emissions as well as overall system performance in terms of…
Expand
2008
2008
Supplemental Data The Signaling Adaptor p 62 Is an Important NF-κ B Mediator in Tumorigenesis
A. Duran
,
J. Linares
,
+4 authors
J. Moscat
2008
Corpus ID: 12336311
Supplemental Experimental Procedures Reagents and antibodies Reagents were purchased as follows: DRB, wortmannin, NAC…
Expand
Highly Cited
2006
Highly Cited
2006
In-broker access control: towards efficient end-to-end performance of information brokerage systems
Fengjun Li
,
Bo Luo
,
+4 authors
C. Chu
Sensor Networks, Ubiquitous, and Trustworthy…
2006
Corpus ID: 10162254
An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold…
Expand
2005
2005
Capability-Based Egress Network Access Control for Transferring Access Rights
Shinichi Suzuki
,
Yasushi Shinjo
,
Toshio Hirotsu
,
K. Itano
,
Kazuhiko Kato
International Conference in IT & Application
2005
Corpus ID: 15449098
In conventional egress network access control (NAC) using access control lists (ACLs), modifying ACLs is a heavy task for…
Expand
2004
2004
State based key hop protocol: a lightweight security protocol for wireless networks
S. Michell
,
K. Srinivasan
ACM International Workshop on Performance…
2004
Corpus ID: 16685963
State Based Key Hop (SBKH) protocol provides a strong, lightweight encryption scheme for battery operated devices, such as the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required