Access point-based control of access control list

作者: Chandrasekhar Therazhandur Sundarraman , Peerapol Tinnakornsrisuphap , Masakazu Shirota , John Wallace Nasielski , Jun Wang

DOI:

关键词: Access timeComputer networkNetwork Access DeviceRogue access pointFixed accessPhysical accessDiscretionary access controlComputer access controlComputer securityComputer scienceRole-based access control

摘要: Access control techniques enable an access terminal to obtain service through point. In some aspects, may be used a user (e.g., owner) of point whether obtains the For example, temporarily disable at points that register with while is disabled thereafter allowed As another shared secret provided whereby, upon presenting point,

参考文章(24)
Sarvar Patel, Todd C. Morgan, Ganapathy S. Sundaram, Robin J. Thompson, Network enforced access control for femtocells ,(2008)
Markus Dillinger, Ivan Ore, Access control for closed subscriber groups ,(2008)
Ashraf M. Dahod, Sanil Kumar Puthiyandyil, Rajesh Ramankutty, Vincent Spinelli, John DePietro, Vijay Kathuria, Mohan Rangan, Rajat Ghai, Shaji E. Radhakrishnan, Interworking gateway for mobile nodes ,(2008)
Robert Michael Claxton, David John Borthwick, David John Clift, John Griffith Johnston, Communications system with direct access mailbox ,(2004)
William Gordon Mansfield, Judson John Flynn, Kurt Donald Huber, Interactive white list prompting to share content and services associated with a femtocell ,(2008)