| 1. | Control and audit based on users under unix Unix下基于用户的网络访问控制和审计 |
| 2. | Port based network access control 基于端口的网络访问控制 |
| 3. | Admission control and qos supported in wireless lan are important research topics in this area 无线局域网中的网络访问控制和对qos的支持也一直是其中重要的研究内容。 |
| 4. | Cooking channels - from the paper how to cook a covert channel is a set of two python scripts ( cgi and client ) allowing to build a communication channel over http cookies 顾名思义,这是一种隐藏通道工具。他提供几种可行方法来实现允许在已被网络访问控制系统授权的数据流上创建并建立任意数据流传输信道。 |
| 5. | The thesis reviews the development of internet and network access control technology currently . it analyzes some product about www contents access control and discusses their specialties and disadvantages 本文首先回顾近年来网络以及网络访问控制技术的发展情况,对目前的一些网络内容访问控制产品进行分析,讨论网络访问控制技术的特点等。 |
| 6. | " . the use of individual mac addresses with eapol permits the use of eapol in shared media lan environments , and , in particular , this has been allowed in order to support the use of port - based network access control in ieee 802 . 11 wireless lan infrastructures “将个体mac地址与eapol ( 7 . 8 )一起使用,可以允许在共享媒体局域网环境中使用eapol ,而且特别是它已经过允许,以便支持在ieee 802 . 11无线局域网基础结构中使用基于端口的网络访问控制。 |
| 7. | In unix system , it is necessary to add module of control and audit based on users . by adding a net module called iplog in solaris , the goal is fulfilled and therefore the safety of operation system is strengthened . it is shown that the method is effective solution with not very heavy load 对于多用户的unix需要有基于用户的网络访问控制和审计。通过在solaris中编写网络模块iplog的方法,在内核之外实现了访问审计,增强了操作系统的安全性。实际使用结果表明这种方式在网络负载不大的情况下是一种有效的解决方式。 |
| 8. | With the purpose of having knowledge of the admission control ability in wireless lan , we analyze the access control mechanism of ieee802 . 11mac and some qos technologies under ieee802 . 11 std . finally , a detailed analysis and successful solution of snmp between pdp server and wireless access point ( ap ) are proposed 为了研究无线局域网中的网络访问控制能力,论文分析了ieee802 . 11标准中mac层的网络访问控制机制,并研究了一些ieee802 . 11标准下的服务质量( qos )技术。 |
| 9. | Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example , station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address . " see ieee 802 . 1x specifications , page 21 , section 7 . 9 , lines 34 - 39 , available to link to in the 在不支持使用安全关联的共享媒体环境中进行使用eapol的尝试会导致基于端口的网络访问控制极易受到攻击;例如,工作站a只要发出一个使用工作站b的个体mac地址的eapol - logoff包,就能够在工作站b上挂装一个成功的拒绝服务攻击。 ” |