Building and managing virtual private networks
Building and managing virtual private networks
An AAA Application Protocol Design and Service for Secure Wireless Internet Gateway Roaming
ICOIN '02 Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part II
A Security Architecture for Mobility-Related Services
Wireless Personal Communications: An International Journal
Providing fault-tolerant authentication and authorization in wireless mobile IP networks
Journal of Systems and Software
Providing AAA services in IPv6 networks
International Journal of Internet Protocol Technology
Multicast receiver access control by IGMP-AC
Computer Networks: The International Journal of Computer and Telecommunications Networking
A study on mobile commerce AAA mechanism for wireless LAN
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Design of an accounting architecture for load and session managed diameter-based AAA network
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
On performance of group key distribution techniques when applied to IPTV services
Computer Communications
Hi-index | 0.01 |
Internet service providers (ISPs) offering dial-up access and purveyors of enterprise networks supporting telecommuters face some difficult challenges. Ever-increasing residential dialup subscribers demand available modem (or ISDN) ports, or threaten to take their business elsewhere. To meet this demand, ISPs (dial providers) are deploying a large number of-complex, port-dense network access servers (NAS) to handle thousands of individual dial-up connections. At the same time, the miniaturization of stationary office essentials, such as the laptop computer and cellular telephone, has coupled with the need for maximum customer face time to create a workforce in perpetual motion. These “road warriors” require secure and reliable access to email and Web resources from hotels, airports, and virtual offices around the world. But dial providers must do more than simply offer an available modem port at the other end of a telephone call. They must protect against theft-of-service attacks by unscrupulous individuals with excess free time; they must verify subscribers' levels of access authorization; and for cost recovery, billing, and resource planning purposes, they may need to meter the connection time to the network. Furthermore, to provide maximum coverage to a growing roaming and mobile subscriber base, they may choose to pool their NAS resources while retaining control over their subscribers' access, usage, and billing information. All these services require coordination between the various administrative systems supported by the dial providers in partnership with each other