Policy-Based Network Access and Behavior Control Management
Title | Policy-Based Network Access and Behavior Control Management |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Tang, C., Fu, X., Tang, P. |
Conference Name | 2020 IEEE 20th International Conference on Communication Technology (ICCT) |
Date Published | Oct. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-8141-7 |
Keywords | abstract policy configuration, Access Control, application server, application system access control, authorisation, behavior control management, behavior control model, behavior management control, behavior management control process, Communication networks, composability, computer network management, data drive, data driven, data fusion, device connection, Human Behavior, identity authentication, Identity management, illegal outreach control, information network, integrated network access, management simplification, Network Access Control, network device, network servers, Networked Control Systems Security, policy-based network access, Predictive Metrics, process control, Protocols, pubcrawl, resilience, Resiliency, Scalability, security, security management, security monitoring, security policies, security policy, Servers |
Abstract | Aiming at the requirements of network access control, illegal outreach control, identity authentication, security monitoring and application system access control of information network, an integrated network access and behavior control model based on security policy is established. In this model, the network access and behavior management control process is implemented through abstract policy configuration, network device and application server, so that management has device-independent abstraction, and management simplification, flexibility and automation are improved. On this basis, a general framework of policy-based access and behavior management control is established. Finally, an example is given to illustrate the method of device connection, data drive and fusion based on policy-based network access and behavior management control. |
URL | https://ieeexplore.ieee.org/document/9295916 |
DOI | 10.1109/ICCT50939.2020.9295916 |
Citation Key | tang_policy-based_2020 |
- Protocols
- Identity management
- illegal outreach control
- information network
- integrated network access
- management simplification
- Network Access Control
- network device
- network servers
- policy-based network access
- process control
- identity authentication
- pubcrawl
- resilience
- Scalability
- security
- security management
- security monitoring
- security policies
- security policy
- Servers
- behavior control model
- Resiliency
- composability
- Predictive Metrics
- abstract policy configuration
- Access Control
- application server
- application system access control
- authorisation
- behavior control management
- Networked Control Systems Security
- behavior management control
- behavior management control process
- Communication networks
- computer network management
- data drive
- Data Driven
- data fusion
- device connection
- Human behavior