Third International Conference on Information Technology and Applications (ICITA'05)
DOI: 10.1109/icita.2005.92
|View full text |Cite
|
Sign up to set email alerts
|

Capability-Based Egress Network Access Control for Transferring Access Rights

Abstract: In conventional egress network access control (NAC) using access control lists (ACLs), modifying ACLs is a heavy task for administrators. To enable rapid configuration without a large amount of effort by administrators, we introduce capabilities to egress NAC. In our egress NAC, a user can transfer his/her access rights (capabilities) to other persons without asking administrators. To realize capability-based egress NAC, we use DNS messages and IP options to carry capabilities. A resolver of the client sends t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 10 publications
(9 reference statements)
0
6
0
Order By: Relevance
“…In the paper Suzuki et al (2005), we have described a method that uses an operating system kernel to manage capabilities. In this paper, we use a utility program called capability-agent to manage capabilities outside the kernel.…”
Section: Article In Pressmentioning
confidence: 99%
See 2 more Smart Citations
“…In the paper Suzuki et al (2005), we have described a method that uses an operating system kernel to manage capabilities. In this paper, we use a utility program called capability-agent to manage capabilities outside the kernel.…”
Section: Article In Pressmentioning
confidence: 99%
“…To carry capabilities, we have extended the DNS message format and defined a new IP option (Suzuki et al, 2005).…”
Section: Versionmentioning
confidence: 99%
See 1 more Smart Citation
“…Client agent playing a very important role is at the forefront of the system. If there is no clear definition of its function or the improper design, client agent can not perform its function, and the entire NAC namely only exists [5]. So it is very essential to study the client agent in-depth.…”
Section: Introductionmentioning
confidence: 97%
“…Network Access Control (NAC) is defined as some control mechanisms which are enforced by network administrators at routers or proxies as to authenticate users and machines to authorize them to access the network [1]. Network access control technology plays an increasingly important role in computer network security, especially against security challenges brought by ubiquitous applications on the heterogeneous networks.…”
Section: Introductionmentioning
confidence: 99%