Network Access Control

Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1990-2016
0102019902016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
This paper presents FlowNAC, a Flow-based Network Access Control solution that allows to grant users the rights to access the… (More)
  • figure 1
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The existence of online social networks that include person specific information creates interesting opportunities for various… (More)
  • figure 1
  • table 1
Is this relevant?
2011
2011
An access control list (ACL) provides security for a private network by controlling the flow of incoming and outgoing packets… (More)
  • table I
  • figure 1
  • figure 2
  • table II
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The existence of on-line social networks that include person specific information creates interesting opportunities for various… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2009
2009
Border access control, network security mechanismand system access control are three separately access controlprocedures when… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2009
2009
In order to ensure end user devices are healthy enough to gain access to the network, providers are making use of advanced… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
  • Lichun Bao
  • 2008 IEEE International Performance, Computing…
  • 2008
Location-based service provisioning is of great interests to wireless Internet service providers. However, the essential… (More)
Is this relevant?
2007
2007
The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Restricting network access of routing and packet forwarding to well-behaving nodes and denying access from misbehaving nodes are… (More)
  • figure 2
  • figure 1
  • table 1
  • table 4
  • table 2
Is this relevant?