DSpace Repository

Secure Hub model and simulation

Show simple item record

dc.contributor.author Watcharapong Srinonghang en_US
dc.date.accessioned 2015-01-12T10:39:30Z
dc.date.available 2015-01-12T10:39:30Z
dc.identifier.uri http://www.cs.ait.ac.th/xmlui/handle/123456789/212
dc.description 30, [6] p. en_US
dc.description.abstract The general secure hub does not detect the user authentication for network access. It is make complicate maintenance to administrator for updating the database of each user and not flexible to usin g the network for end user. The protection can be achieved by using managed secure hubs. The SecureHub model simulates PC as bridge that is very economically with cost - effective connectivity for small installations. This model establishes a system to ide ntify both computer and user authentication. It enables the network administrators to trace and protect the unauthorized users from using the computer on the network. In addition, this model simulates the user connection by using the user account informati on (user id and password) which centralize authentication database. T he traffic on network should enable detect or filter from user authentication on network equipment and support multiple access to one network interface. Moreover, i t is to do hub security for user connection to the system. Furthermore, this model is meant to contribute to the ongoing discussion and development of methods in the specific network resources and network security.
dc.relation.ispartof Asian Institute of Technology. Thesis no. CS-01-3 en_US
dc.relation.ispartof Thesis no. CS-01-3 en_US
dc.subject Computer security en_US
dc.title Secure Hub model and simulation en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account