DocumentCode :
556163
Title :
Quantifying the role of access control in end-to-end network security
Author :
Ahmed, Usama ; Masood, Ammar ; Khan, Liaquat Ali
Author_Institution :
Security & Cryptology Cell, Air Univ., Islamabad, Pakistan
fYear :
2011
fDate :
5-7 Oct. 2011
Firstpage :
1
Lastpage :
6
Abstract :
Modern day networks consist of a mix and match of technologies with varying capabilities. Securing such networks is a tedious task and demands a lot of contribution from security professionals; however, failing to conduct an in depth and standardized analysis may result in an imperfect network security design. ITU-T provides recommendation for end-to-end network security in its standard X.805 which precisely lays down the foundation for the assessment of network security. Keeping X.805 requirements and the current network in view, the next thing that security professionals face is the correlation of both and its practical implementation. This paper contributes to answer the same and gives a comprehensive methodology for practical implementation of X.805 architecture. Also this paper takes into account the current trend of Network Access Control solution and its quantitative contribution towards achieving the desired goals set by X.805 standard.
Keywords :
access control; telecommunication network management; telecommunication security; telecommunication standards; ITU-T X.805 standard; end-to-end network security; network access control; network security design; Access control; Authentication; Computer architecture; Fires; IP networks; ISO standards; ISO-18028; Network Access Control; X.805; compliance; end-to-end security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2011 3rd International Congress on
Conference_Location :
Budapest
ISSN :
2157-0221
Print_ISBN :
978-1-4577-0682-0
Type :
conf
Filename :
6078864
Link To Document :
بازگشت