J. L. Mejía-Nogales, S. Vidal-Beltrán, J. López-Bonilla
{"title":"IEEE802.11无线网络信息资源安全访问系统的设计与实现","authors":"J. L. Mejía-Nogales, S. Vidal-Beltrán, J. López-Bonilla","doi":"10.1109/CERMA.2006.34","DOIUrl":null,"url":null,"abstract":"Information security has been one of the most sensible issues when designing communications systems; especially when this information is cataloged as confidential. This paper deals with a secure system that let you get access to privileged data, when the medium access is a wireless network based on IEEE 802.11 standard. The system designed is conformed by three main functions, which capture the first http request and forward it to an authentication server; the server validates the user's identity in order to give access to the information resources. The control access entity determines which users are allowed or denied from the system. These functions are performed by a captive portal, an authentication server and an access point","PeriodicalId":179210,"journal":{"name":"Electronics, Robotics and Automotive Mechanics Conference (CERMA'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Design and Implementation of a Secure Access System to Information Resources for IEEE802.11 Wireless Networks\",\"authors\":\"J. L. Mejía-Nogales, S. Vidal-Beltrán, J. López-Bonilla\",\"doi\":\"10.1109/CERMA.2006.34\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security has been one of the most sensible issues when designing communications systems; especially when this information is cataloged as confidential. This paper deals with a secure system that let you get access to privileged data, when the medium access is a wireless network based on IEEE 802.11 standard. The system designed is conformed by three main functions, which capture the first http request and forward it to an authentication server; the server validates the user's identity in order to give access to the information resources. The control access entity determines which users are allowed or denied from the system. These functions are performed by a captive portal, an authentication server and an access point\",\"PeriodicalId\":179210,\"journal\":{\"name\":\"Electronics, Robotics and Automotive Mechanics Conference (CERMA'06)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-09-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Electronics, Robotics and Automotive Mechanics Conference (CERMA'06)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CERMA.2006.34\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electronics, Robotics and Automotive Mechanics Conference (CERMA'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CERMA.2006.34","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design and Implementation of a Secure Access System to Information Resources for IEEE802.11 Wireless Networks
Information security has been one of the most sensible issues when designing communications systems; especially when this information is cataloged as confidential. This paper deals with a secure system that let you get access to privileged data, when the medium access is a wireless network based on IEEE 802.11 standard. The system designed is conformed by three main functions, which capture the first http request and forward it to an authentication server; the server validates the user's identity in order to give access to the information resources. The control access entity determines which users are allowed or denied from the system. These functions are performed by a captive portal, an authentication server and an access point