作者: Chandrasekhar Therazhandur Sundarraman , Peerapol Tinnakornsrisuphap , Masakazu Shirota , John Wallace Nasielski , Jun Wang
DOI:
关键词: Access time 、 Computer network 、 Network Access Device 、 Rogue access point 、 Fixed access 、 Physical access 、 Discretionary access control 、 Computer access control 、 Computer security 、 Computer science 、 Role-based access control
摘要: Access control techniques enable an access terminal to obtain service through point. In some aspects, may be used a user (e.g., owner) of point whether obtains the For example, temporarily disable at points that register with while is disabled thereafter allowed As another shared secret provided whereby, upon presenting point,