{"title":"NCMS访问控制策略的实施方法","authors":"Zhigang Zhao, Huaqun Guo","doi":"10.1109/SOLI.2018.8476718","DOIUrl":null,"url":null,"abstract":"Configuration of large-scale networks is difficult and error-prone. Misconfigurations known as vulnerabilities are a major cause of network outages and security problems. This paper proposes an effective Network Configuration Management System (NCMS) with the enforced Access Control policies and centralized management method to provide a controllable security access interface for the configuration management of internal network devices and leads to better network resiliency, security, and scalability.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Method for Enforcing Access Control Policies on NCMS\",\"authors\":\"Zhigang Zhao, Huaqun Guo\",\"doi\":\"10.1109/SOLI.2018.8476718\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Configuration of large-scale networks is difficult and error-prone. Misconfigurations known as vulnerabilities are a major cause of network outages and security problems. This paper proposes an effective Network Configuration Management System (NCMS) with the enforced Access Control policies and centralized management method to provide a controllable security access interface for the configuration management of internal network devices and leads to better network resiliency, security, and scalability.\",\"PeriodicalId\":424115,\"journal\":{\"name\":\"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SOLI.2018.8476718\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOLI.2018.8476718","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Method for Enforcing Access Control Policies on NCMS
Configuration of large-scale networks is difficult and error-prone. Misconfigurations known as vulnerabilities are a major cause of network outages and security problems. This paper proposes an effective Network Configuration Management System (NCMS) with the enforced Access Control policies and centralized management method to provide a controllable security access interface for the configuration management of internal network devices and leads to better network resiliency, security, and scalability.