|
[1] C. J. Fu, Q. H. Cao, “Design and Implementation of Client agent in the Network Admission Control”, International Congress on Ultra Modem Telecommunications and Control System and Workshops (ICUMT), 2010. [2] Http://en.wikipedia.org/wiki/Active_Directory, “Active Directory”. [3] RFC 3748, “Extensible Authentication Protocol, EAP Usage Within IEEE 802”, IETF, § 3.3, 2004. [4] RFC 3748, “Extensible Authentication Protocol, Link Layer”, IETF, § 7.12, 2004. [5] IEEE 802.1X-2001, “Port Based Network Access Control”, § 7. [6] IEEE 802.1X-2004, “Port Based Network Access Control”, § 3.2.2. [7] IEEE 802.1X-2010, “Port Based Network Access Control”, page iv. [8] IEEE 802.1X-2010, “Port Based Network Access Control”, § 5. [9] Http://www.wireless-nets.com/resources/downloads/802.1x_C2.html, “802.1X Port-Based Authentication Concepts”. [10] Data Sheet: Alcatel-Lucent, “OmniSwitch AOS Release 6 Network Configuration Guide”, pp. 30-1~30-46, Mar 2009. [11] Http://wiki.personaltelco.net/CaptivePortal, “CaptivePortal”. [12] Http://www.sflow.org, “Making the Network Visible”. [13] Http://www.securityfocus.com/infocus/1817, “The Perils of Deep Packet Inspection”. [14] Http://dpi.priv.gc.ca/index.php/essays/just-deliver-the-packets/, “Just Deliver the Packets”. [15] Http://userpage.fu-berlin.de/~bendrath/Paper_Ralf-Bendrath_DPI_v1-5.pdf, “Global technology trends and national regulation : Explaining Variation in the Governance of Deep Packet Inspection”. [16] Data Sheet: Opus One, “Selecting An Approach For NAC Enforcement : Five Key Issues”, pp. 1~15, Sept 2007.
|