Visible to the public Policy-Based Network Access and Behavior Control Management

TitlePolicy-Based Network Access and Behavior Control Management
Publication TypeConference Paper
Year of Publication2020
AuthorsTang, C., Fu, X., Tang, P.
Conference Name2020 IEEE 20th International Conference on Communication Technology (ICCT)
Date PublishedOct. 2020
ISBN Number978-1-7281-8141-7
Keywordsabstract policy configuration, Access Control, application server, application system access control, authorisation, behavior control management, behavior control model, behavior management control, behavior management control process, Communication networks, computer network management, data drive, data driven, data fusion, device connection, Human Behavior, identity authentication, Identity management, illegal outreach control, information network, integrated network access, management simplification, Network Access Control, network device, network servers, policy-based network access, process control, Protocols, pubcrawl, resilience, Resiliency, Scalability, security, security management, security monitoring, security policies, security policy, Servers

Aiming at the requirements of network access control, illegal outreach control, identity authentication, security monitoring and application system access control of information network, an integrated network access and behavior control model based on security policy is established. In this model, the network access and behavior management control process is implemented through abstract policy configuration, network device and application server, so that management has device-independent abstraction, and management simplification, flexibility and automation are improved. On this basis, a general framework of policy-based access and behavior management control is established. Finally, an example is given to illustrate the method of device connection, data drive and fusion based on policy-based network access and behavior management control.

Citation Keytang_policy-based_2020