NAC System Analysis and Design for Improvement Model

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 215)

Abstract

Many companies are using a large network, and this helps facilitate information exchange and business corporate. But the use of the intranet cause often the secrets leaked or waste of computer resources of corporate and then this cause the huge social losses. In order to protect the company’s high technology and information the companies should take appropriate information security measures for information security themselves. In this paper, we would like to emphasize the necessity of establishing the concept of Network Access Control (NAC) system. For this, we analyze the features of commercial systems, and we propose the enhanced NAC model with its own security features.

Keywords

Network access control Authentication Access control 

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
    López G, Gómez AF, Marín R, Cánovas O (2005) A network access control approach based on the AAA architecture and authorization attributes. In: Proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS’05)Google Scholar
  5. 5.
    Suzuki S, Shinjo Y, Hirotsu T (2005) Capability-based egress network access control for transferring access rights. In: Proceedings of the third international conference on information technology and applications (ICITA’05)Google Scholar
  6. 6.
    IEEE802 (2001) Port-based network access control, IEEE Std 802.1X-2001Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department of Information Security EngineeringJoongbu UniversityGeumsan-gunSouth Korea
  2. 2.Departnent of Information Security EngineeringJoongbu UniversityGeumsan-gunSouth Korea

Personalised recommendations