International Conference on Networking and Services (ICNS'06) 2006
DOI: 10.1109/icns.2006.43
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Network Management System with DACS Scheme

Abstract: Where customers with different membership and position, use computers as in the university network systems, it often takes much time and efforts for them to cope with the change of the system management. This is because the requirements for the respective computer usage are different in the network and security policies. In this paper, a new destination addressing control system (DACS) scheme for the university network services is proposed. The DACS Scheme performs the network services efficiently through the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 8 publications
(4 reference statements)
0
15
0
Order By: Relevance
“…In existing mechanisms, user authentication is performed at this point in time. If access is permitted, information related to the user is searched from data that is accumulated in advance (6). To accumulate the data, there are methods using relational databases or document medium.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…In existing mechanisms, user authentication is performed at this point in time. If access is permitted, information related to the user is searched from data that is accumulated in advance (6). To accumulate the data, there are methods using relational databases or document medium.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…To accumulate the data, there are methods using relational databases or document medium. Following search, the data related to each user are extracted (7). Programs on the Web server side programs that receive the data, such as CGI, generate a Web page dynamically from the data.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…(1) Suggestion of the principle in the DACS Scheme [27] (2) Additional access control function for preventing the access from the physical client that does not have the PEP on it.…”
Section: Figure 2 Principle In First Schemementioning
confidence: 99%