{"title":"教育机构实施WPA2-enterprise的效果","authors":"Konstantin Yanson","doi":"10.1109/ICAICT.2016.7991701","DOIUrl":null,"url":null,"abstract":"This article devoted to practical results of implementing wireless access to an educational network for students end employees in the SPO department of the ITMO University during 4 educational years. Experimental result shows how users deal with security whilst using their BYOD. Security and simplicity are two desirable but incompatible features that need to be balanced. Paper can help to find trade-off between security and convenience when we implement WPA2-Enterprise authentication. Results show what happens when we put security on users and at the same time cutback IT supplying.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Results of implementing WPA2-enterprise in educational institution\",\"authors\":\"Konstantin Yanson\",\"doi\":\"10.1109/ICAICT.2016.7991701\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article devoted to practical results of implementing wireless access to an educational network for students end employees in the SPO department of the ITMO University during 4 educational years. Experimental result shows how users deal with security whilst using their BYOD. Security and simplicity are two desirable but incompatible features that need to be balanced. Paper can help to find trade-off between security and convenience when we implement WPA2-Enterprise authentication. Results show what happens when we put security on users and at the same time cutback IT supplying.\",\"PeriodicalId\":446472,\"journal\":{\"name\":\"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2016.7991701\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2016.7991701","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

本文介绍了ITMO大学SPO系学生和员工在4个学年期间实现无线接入教育网的实际效果。实验结果显示了用户在使用自带设备时如何处理安全问题。安全性和简单性是需要平衡的两个不兼容的特性。当我们实现WPA2-Enterprise身份验证时,纸可以帮助我们在安全性和便利性之间找到平衡点。结果表明,当我们把安全放在用户身上,同时削减IT供应时,会发生什么。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Results of implementing WPA2-enterprise in educational institution
This article devoted to practical results of implementing wireless access to an educational network for students end employees in the SPO department of the ITMO University during 4 educational years. Experimental result shows how users deal with security whilst using their BYOD. Security and simplicity are two desirable but incompatible features that need to be balanced. Paper can help to find trade-off between security and convenience when we implement WPA2-Enterprise authentication. Results show what happens when we put security on users and at the same time cutback IT supplying.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Opinion mining and Sentiment Analysis for contextual online-advertisement Analysis of bioclimatic structure of animals' habitats on the base of the heat balance simulation The subject-oriented notation for end-user data modelling Semi-automatic annotation tool for sign languages VLSI elements placement based on simulation of bats behavior in nature
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1