Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,166,819 papers from all fields of science
Search
Sign In
Create Free Account
TACACS
Known as:
TACACS+
, TACACSPlus
, XTACACS
Terminal Access Controller Access-Control System (TACACS, usually pronounced like tack-axe) refers to a family of related protocols handling remote…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Authentication protocol
Dell PowerConnect
Diameter (protocol)
Information security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
The TACACS+ Protocol
T. Dahm
,
L. Grant
,
D. Carrel
,
A. Ota
2020
Corpus ID: 63204105
TACACS+ provides Device Administration for routers, network access servers and other networked computing devices via one or more…
Expand
2014
2014
Security Penetration Test Framework for the Diameter Protocol
F. R. Carlson
arXiv.org
2014
Corpus ID: 9982132
This paper outlines the infrastructure required for a penetration testing suite centered around the cellular call control…
Expand
2010
2010
Chapter 8 – Network Authentication
I. Dubrawsky
2010
Corpus ID: 54122881
2007
2007
Centralized Authentication Services (Radius, Tacacs, Diameter)
B. Stackpole
Information Security Management Handbook, 6th ed.
2007
Corpus ID: 31249209
INTRODUCTION RADIUS, TACACS, and DIAMETER are classified as authentication, authorization, and accounting (AAA) servers. The…
Expand
2005
2005
Securing the MPLS Control Plane
F. Palmieri
,
Ugo Fiore
IEEE International Conference on High Performance…
2005
Corpus ID: 9055221
As the Internet continues to grow, it faces an increasingly hostile environment and consequently, the need for security in…
Expand
2005
2005
Centralized Network Security Model Using Dynamic Vlan and Client Authentication
L. Vokorokos
,
M. Chovanec
,
Ondrej Látka
,
Juraj Halász
2005
Corpus ID: 15280177
Computer networks noticed the great progress and an application extension in the last decades. In the present the quantum of the…
Expand
2004
2004
Chapter 6 – Authenticating Users
Chris Tobkin
,
Daniel Kligerman
2004
Corpus ID: 60335835
2003
2003
Remote Dail-up Implementation with XTACACS
Li Yuanchun
2003
Corpus ID: 57102338
This paper introduces XTACACS protocol and XTACACSD software, and give an implementation of XTACACS in campus network.
2002
2002
Network Management Temporal Database System Based on XTACACS Protocol
Min Hua-qing
2002
Corpus ID: 63928322
This paper first analyzes the basic concepts of Cisco router user certification, XTACACS certification protocol and describes the…
Expand
1984
1984
TACACS user identification Telnet option
B. Anderson
Request for Comments
1984
Corpus ID: 31347177
The following is the description of a TELNET option designed to facilitate double login avoidance. It is intended primarily for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE