{"title":"安全院落里的加权通信","authors":"T. Droste","doi":"10.1109/TELSKS.2001.955820","DOIUrl":null,"url":null,"abstract":"In a local area network (LAN), the availability of all network components is indispensable. To reach this goal it is necessary to secure a LAN against unwanted communication from outside. If there is an unauthorized access which blocks the internal traffic, the security mechanism has to react and must exclude this traffic from the internal network.","PeriodicalId":253344,"journal":{"name":"5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service. TELSIKS 2001. Proceedings of Papers (Cat. No.01EX517)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Weighted communication in a security compound\",\"authors\":\"T. Droste\",\"doi\":\"10.1109/TELSKS.2001.955820\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In a local area network (LAN), the availability of all network components is indispensable. To reach this goal it is necessary to secure a LAN against unwanted communication from outside. If there is an unauthorized access which blocks the internal traffic, the security mechanism has to react and must exclude this traffic from the internal network.\",\"PeriodicalId\":253344,\"journal\":{\"name\":\"5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service. TELSIKS 2001. Proceedings of Papers (Cat. No.01EX517)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-09-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service. TELSIKS 2001. Proceedings of Papers (Cat. No.01EX517)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TELSKS.2001.955820\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service. TELSIKS 2001. Proceedings of Papers (Cat. No.01EX517)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELSKS.2001.955820","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In a local area network (LAN), the availability of all network components is indispensable. To reach this goal it is necessary to secure a LAN against unwanted communication from outside. If there is an unauthorized access which blocks the internal traffic, the security mechanism has to react and must exclude this traffic from the internal network.