TNC-UTM: A Holistic Solution to Secure Enterprise Networks

作者: Fachao Deng , Anan Luo , Yaokun Zhang , Zhen Chen , Xuehai Peng

DOI: 10.1109/ICYCS.2008.380

关键词:

摘要: This paper presents TNC-UTM, a holistic solution to secure enterprise networks from gateway endpoints. Just as its name suggested, the TNC-UTM combines two popular techniques TNC and UTM together by defining an interface between them that integrates their security capacity provide efficiently network access control protection for network. Not only provides features of UTM, but also it achieves stronger higher performance introducing intelligent configuration decisions RBAC mechanism. Experiment demonstrated superior advantages solution.

参考文章(6)
David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli, Role-Based Access Control ,(2003)
G Gerard Zwaan, BW Bruce Watson, A taxonomy of keyword pattern matching algorithms Computing science notes. ,vol. 9227, pp. 25- 39 ,(1992)
B.W. Watson, G. Zwaan, A taxonomy of sublinear multiple keyword pattern matching algorithms Science of Computer Programming. ,vol. 27, pp. 85- 118 ,(1996) , 10.1016/0167-6423(96)00008-1
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li, Towards System-level Optimization for High Performance Unified Threat Management international conference on networking and services. pp. 7- 7 ,(2007) , 10.1109/ICNS.2007.126
David E. Taylor, Survey and taxonomy of packet classification techniques ACM Computing Surveys. ,vol. 37, pp. 238- 275 ,(2005) , 10.1145/1108956.1108958