2007
DOI: 10.1145/1239971.1239972
|View full text |Cite
|
Sign up to set email alerts
|

Requirements for scalable access control and security management architectures

Abstract: Maximizing local autonomy by delegating functionality to end nodes when possible (the "end to end" design principle) has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access-control policies and mechanisms. Yet management of security is becoming an increasingly challenging problem, in no small part due to scaling up of measures such as number of users, protocols, applications, network elements, topological constraints, and func… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2010
2010
2025
2025

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 26 publications
references
References 29 publications
(19 reference statements)
0
0
0
Order By: Relevance