The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the management efficiency and convenience of the access control system in intelligent building, according to the new demand, a network entrance guard management software has been in this paper developed based on original software for single computer system. Inquiring real-time network data, browsing real-time information and long-distance monitoring can be realized by use of the...
The typical security solution can only ensure the security of the network boundary, but not involve the internal security. According to different types of applications and secrets that it provides, the network can be divided into a number of logical security domains. Furthermore, the access control of the network could be realized by applying dynamical VLAN technology, and the filtration and audit...
Due to the rapid increasing of system users, it is becoming a tiresome task for the administrator to assign roles and maintain permissions in traditional RBAC model. In order to simplify the administrator's work and standardize security strategy, human's fuzzy decision-making capability is required. In this paper, an optimized RBAC model based on fuzzy theory is proposed. Bitmap matrix is used for...
Nowadays applications are mostly service oriented and cross-boundary, entities involved in the access control process are usually unfamiliar, so traditional access control mechanism, which basically uses the identity of the involved entities to control authorization internal the organization, is no longer sufficient. Then, trust negotiation is brought out to construct trust between unfamiliar entities...
The packet filter rules of firewall are established according to the needs of network security, while to manage filter rules becomes more and more complicated, and easy to make mistakes, especially in enterprise network. In order to implement correct policies, the firewall filter rules should be checked and organized carefully. This article studied the relations between firewall filter rules, defined...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.