Network address transparency through user role authentication

作者: Sridhar Subramanian , Victor Moreno , Sanjay Kumar Hooda , Mark Montanez , Darrin Joseph Miller

DOI:

关键词: Routing (electronic design automation)AuthenticationComputer networkIdentity (object-oriented programming)Virtual networkNetwork elementNetwork addressComputer scienceTransparency (human–computer interaction)Controller (computing)

摘要: Changes are made to a virtual network for an endpoint based on the authenticated user identity of endpoint. The system includes server and controller associated with fabric which is connected. elements carry traffic authenticates address determines authentication. first identity. receives notification from that be routed over network. updates routing information associate sends updated fabric.

参考文章(15)
Dmitry A. Anipko, Scott A. Roberts, Yaniv Naor, Sharad Kylasam, Ensuring symmetric routing to private network ,(2012)
Erik Carlin, Paul Voccio, Vishvananda Ishaya, Method and System for Identity-Based Authentication of Virtual Machines ,(2015)
Satish Gundabathula, Sivakumar Chaturvedi, Rameshkumar Chaturvedi, System and method for providing a virtual peer-to-peer environment ,(2011)
Steven Rosenthal, David C. Douglas, Chet Birger, Kenneth R. Traub, Computer system for authenticating a computing device ,(2003)
G. Nakamoto, R. Durst, C. Growney, J. Andresen, J. Ma, N. Trivedi, R. Quang, D. Pisano, Identity-Based Internet Protocol Networking military communications conference. pp. 1- 6 ,(2012) , 10.1109/MILCOM.2012.6415566
Dan Boneh, Nick Mckeown, Scott Shenker, Michael J. Freedman, Martin Casado, Secure network switching infrastructure ,(2008)