The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
WebRTC server infrastructures are useful for creating rich real-time communication (RTC) applications. Developers commonly use them for accessing capabilities such as group communications, archiving, and transcoding. Details on how to implement and use such infrastructures securely are of increasing interest to the engineering community. Kurento is an open source project that provides a WebRTC media...
URP, through a portal system, integrate various kinds of information in various application systems as a whole digital campus. Single sign-on is a method to achieve a unified portal authentication. On the basis of summarizing the single sign-on model usually used, a combined model based on broker, agent and token was proposed, which used cookie token, session tree of access permissions and control...
NETCONF is a new protocol as the network becomes more and more complexity, which has a better capability administering lots of devices. However, the large scale network brings some trouble for implementing access control especially when administers need to deploy or update policies on each devices. In this regard, the architecture of centralized access control proxy server based on NETCONF is focused,...
Home network is required for installment, simple & convenient use, expensive cost, various application service. Security is essential requirement for the interlock of intranet and extranet. To control home network by outside user terminal, this paper proposes that the outside client connects home server using SOAP (Simple Object Access Protocol) message. Based on x.509 v3, the proposed system...
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. Privacy is accomplished by encrypting connections between the subscriber station and the base station. The base station protects against unauthorized access by enforcing encryption of service flows across the network. This paper analyzes the physical layer...
This article discusses the agent-based wireless data center architecture. The system is devised by 6 parts, such as the GPRS communications services, the embedded Linux database server, the GSM modem, the core monitoring system, the B/S access control and the wireless router firewall and so on. They can be distributed in different servers or the same server. The system uses a distributed work model,...
In the present world of communication and information interchange where more and more users are bound to use the same services and data with different access levels, the need for providing protection against potential breach of secured data has gained profound importance. Some of the common services are virtual private network (VPN), remote access server (RAS), Web server, mail server etc. In the...
The paper proposes an organization model hosted in the LDAP directory server. And it expands the scope of model utilization, gives the technical method which is capable of dealing with the heterogeneity, distribution of the organization model, and the transparency of the model to its users. Then the role-based access control (RBAC) technology has been used in the model to implement the control of...
Multicasting has not been widely adopted until now, due to lack of receiver or end user (EU) access control. We have developed the Internet group management protocol with access control (IGMP-AC), an extended version of IGMPv3, which provides EU access control by incorporating the AAA framework into the existing multicast service model. Furthermore, IGMP-AC works as an extensible authentication protocol...
According to the standard and technology of the network host identifying and access controlling and to strategy of the next generation network real-name identifying, a host real- name architecture based on the HIP protocol is proposed for implementing peer-to-peer identity trusting, global access controlling and authorizing in the next generation network, and preventing anonymous and arbitrary network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.