Systems and methods of identity and access management

作者: Dean A. Trumbull , Michael Roy Stute

DOI:

关键词: Physical accessNetwork Access ControlNetwork securityAccess managementComputer securityComputer access controlComputer scienceNetwork Admission ControlIdentity managementAccess network discovery and selection function

摘要: The present disclosure generally provides systems and methods of providing identification access management. system could include a network security zone having rules for resource object associated with the network. also module to collect information related an attempt generate alert if collected fails meet certain requirements rules. change prevent possible future unauthorized attempts based on information.

参考文章(8)
Vasily Zolotov, Ernst Carter, Network surveillance and security system ,(2001)
Timothy J. Fraser, Homayoon Tajalli, Jeffrey J. Graham, Behavior-based host-based intrusion prevention system ,(2004)
Mark Shull, Elisa Cooper, William Bohlman, Online identity tracking ,(2006)
Ernest Rakaczky, George Simpson, Juan Peralta, Clayton Coleman, David Rath, Bharat Khuti, Jim Leslie, Process control methods and apparatus for intrusion detection, protection and network hardening ,(2005)
Paul G. Gonsalves, Catherine Dudley Call, Stephen Ho, David Lapsley, Security system for and method of detecting and responding to cyber attacks on large network systems ,(2007)
Christopher Jay Rouland, Christopher W. Klaus, Patrick Morton Becker, Method and system for dynamically protecting a computer system from attack ,(2003)