• español 
    • español
    • English
    • français
  • FacebookPinterestTwitter
  • español
  • English
  • français
Ver ítem 
  •   DIGIBUG Principal
  • 1.-Investigación
  • Departamentos, Grupos de Investigación e Institutos
  • Departamento de Teoría de la Señal, Telemática y Comunicaciones
  • DTSTC - Artículos
  • Ver ítem
  •   DIGIBUG Principal
  • 1.-Investigación
  • Departamentos, Grupos de Investigación e Institutos
  • Departamento de Teoría de la Señal, Telemática y Comunicaciones
  • DTSTC - Artículos
  • Ver ítem
JavaScript is disabled for your browser. Some features of this site may not work without it.

A Novel Zero-Trust Network Access Control Scheme based on the Security Profile of Devices and Users

[PDF] Artículo enviado (3.574Mb)
Identificadores
URI: https://hdl.handle.net/10481/90282
DOI: https://doi.org/10.1016/j.comnet.2022.109068
Exportar
RISRefworksMendeleyBibtex
Estadísticas
Ver Estadísticas de uso
Metadatos
Mostrar el registro completo del ítem
Autor
García Teodoro, Pedro; Camacho Páez, José; Macía Fernández, Gabriel; Gómez Hernández, José Antonio; López-Marín, Víctor
Editorial
Elsevier
Materia
Access control
 
Zero trust
 
Security profile
 
Fecha
2022
Referencia bibliográfica
Computer Networks, Vol. 212, 109068
Resumen
Security constitutes a principal concern for communication networks and services at present. This way, threats should be under control to minimize risks over time in real environments. With this aim, we introduce here a new approach for access control aimed to strengthen security in corporate networks and service providers related environments. Our proposal, named SADAC (Security Attribute-based Dynamic Access Control) presents three main novel features: (i) security related attributes regarding both configuration and operation are considered for network access control of final devices/users; (ii) a dynamic supervision procedure is implemented to evaluate the security profile associated to devices/users over time and, if so, to apply corresponding access restrictions; and (iii) a supervision procedure that also permits to diagnose the causes of inadequate security behaviours, so that the final devices/users can adapt their configuration and/or operation. We describe the overall access control methodology as well as the aspects for its implementation. In particular, we present and evaluate the specific deployment of SADAC for a corporate WiFi environment supported on a Raspberry Pi-based AP to provide Internet access to mobile devices. Through this experimentation we can conclude the convenience of adopting the approach for improving security by minimizing risks in network and communication environments.
Colecciones
  • DTSTC - Artículos

Mi cuenta

AccederRegistro

Listar

Todo DIGIBUGComunidades y ColeccionesPor fecha de publicaciónAutoresTítulosMateriaFinanciaciónPerfil de autor UGREsta colecciónPor fecha de publicaciónAutoresTítulosMateriaFinanciación

Estadísticas

Ver Estadísticas de uso

Servicios

Pasos para autoarchivoAyudaLicencias Creative CommonsSHERPA/RoMEODulcinea Biblioteca UniversitariaNos puedes encontrar a través deCondiciones legales

Contacto | Sugerencias