{"id":"https://openalex.org/W1503798813","doi":"https://doi.org/10.1007/978-3-8348-9283-6_16","title":"Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect","display_name":"Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W1503798813","doi":"https://doi.org/10.1007/978-3-8348-9283-6_16","mag":"1503798813"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-8348-9283-6_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_16","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046338378","display_name":"Josef von Helden","orcid":null},"institutions":[{"id":"https://openalex.org/I4210124827","display_name":"University of Arts","ror":"https://ror.org/030rcn265","country_code":"AL","type":"education","lineage":["https://openalex.org/I4210124827"]},{"id":"https://openalex.org/I52768194","display_name":"Hanover College","ror":"https://ror.org/00vc14296","country_code":"US","type":"education","lineage":["https://openalex.org/I52768194"]}],"countries":["AL","US"],"is_corresponding":true,"raw_author_name":"Josef von Helden","raw_affiliation_strings":["University of Applied Science and Arts, Hanover","University of Applied Science and Arts"],"affiliations":[{"raw_affiliation_string":"University of Applied Science and Arts, Hanover","institution_ids":["https://openalex.org/I52768194"]},{"raw_affiliation_string":"University of Applied Science and Arts","institution_ids":["https://openalex.org/I4210124827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024043278","display_name":"Ingo Bente","orcid":null},"institutions":[{"id":"https://openalex.org/I4210124827","display_name":"University of Arts","ror":"https://ror.org/030rcn265","country_code":"AL","type":"education","lineage":["https://openalex.org/I4210124827"]},{"id":"https://openalex.org/I52768194","display_name":"Hanover College","ror":"https://ror.org/00vc14296","country_code":"US","type":"education","lineage":["https://openalex.org/I52768194"]}],"countries":["AL","US"],"is_corresponding":false,"raw_author_name":"Ingo Bente","raw_affiliation_strings":["University of Applied Science and Arts, Hanover","University of Applied Science and Arts"],"affiliations":[{"raw_affiliation_string":"University of Applied Science and Arts, Hanover","institution_ids":["https://openalex.org/I52768194"]},{"raw_affiliation_string":"University of Applied Science and Arts","institution_ids":["https://openalex.org/I4210124827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5046338378"],"corresponding_institution_ids":["https://openalex.org/I4210124827","https://openalex.org/I52768194"],"apc_list":null,"apc_paid":null,"fwci":0.471,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61930712,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"152","last_page":"162"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trusted-network-connect","display_name":"Trusted Network Connect","score":0.8067057132720947},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.7933889031410217},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6869089007377625},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6509398221969604},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.6209139227867126},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.609641969203949},{"id":"https://openalex.org/keywords/mandatory-access-control","display_name":"Mandatory access control","score":0.5827774405479431},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.5440492033958435},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.47837701439857483},{"id":"https://openalex.org/keywords/openness-to-experience","display_name":"Openness to experience","score":0.4104200303554535},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1909288763999939},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.1802416443824768},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08382466435432434}],"concepts":[{"id":"https://openalex.org/C206149592","wikidata":"https://www.wikidata.org/wiki/Q3999882","display_name":"Trusted Network Connect","level":3,"score":0.8067057132720947},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.7933889031410217},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6869089007377625},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6509398221969604},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.6209139227867126},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.609641969203949},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.5827774405479431},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.5440492033958435},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.47837701439857483},{"id":"https://openalex.org/C84976871","wikidata":"https://www.wikidata.org/wiki/Q2015673","display_name":"Openness to experience","level":2,"score":0.4104200303554535},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1909288763999939},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.1802416443824768},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08382466435432434},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-8348-9283-6_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_16","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W101927482"],"related_works":["https://openalex.org/W2355956995","https://openalex.org/W2381474365","https://openalex.org/W2372678089","https://openalex.org/W2086874776","https://openalex.org/W104943326","https://openalex.org/W2350048275","https://openalex.org/W2389819096","https://openalex.org/W2508973909","https://openalex.org/W2113635936","https://openalex.org/W2387926039"],"abstract_inverted_index":{"Network":[0,33],"Access":[1],"Control":[2],"(NAC)":[3],"is":[4,36,101,106,122],"the":[5,29,65,88,114,124,135],"most":[6],"promising":[7],"approach":[8,39],"to":[9,19,45,78,87,111,144,162],"provide":[10],"protection":[11],"against":[12],"sophisticated":[13],"attacks":[14],"that":[15,90],"first":[16],"compromise":[17],"endpoints":[18],"subsequently":[20],"continue":[21],"their":[22],"evil":[23],"work":[24],"in":[25,81,118,165],"networks":[26],"accessible":[27],"via":[28],"compromised":[30],"endpoint.":[31],"Trusted":[32,54,158],"Connect":[34],"(TNC)":[35],"a":[37,68,167],"NAC":[38,172],"featuring":[40],"interoperability":[41,91],"and":[42,51,73,99,113,147,153,157,170,177],"unforgeability":[43,105],"due":[44],"its":[46],"openness,":[47],"broad":[48],"vendor":[49],"support":[50],"integration":[52],"of":[53,67,96,116,129],"Computing":[55,159],"functions.":[56],"This":[57],"paper":[58],"presents":[59],"experiences":[60],"with":[61],"TNC":[62,69,80,94,117,156],"gained":[63],"from":[64],"development":[66],"implementation,":[70],"called":[71],"TNC@FHH":[72],"some":[74],"analyses":[75],"on":[76,123,134],"how":[77],"adopt":[79],"real":[82,119,168],"world":[83,120],"scenarios.":[84],"It":[85],"comes":[86],"conclusion":[89],"between":[92],"basic":[93],"components":[95],"different":[97],"vendors":[98],"developers":[100],"obviously":[102],"actually":[103],"good,":[104],"well":[107],"designed":[108],"but":[109,133],"hard":[110],"achieve,":[112],"adoption":[115],"scenarios":[121],"one":[125],"hand":[126,137],"desired":[127],"because":[128],"obvious":[130],"security":[131],"benefits,":[132],"other":[136],"today":[138],"there":[139],"are":[140,160],"several":[141],"handicaps":[142],"leading":[143],"high":[145],"complexity":[146],"costs.":[148],"That\u2019s":[149],"why":[150],"further":[151],"developments":[152],"enhancements":[154],"concerning":[155],"required":[161],"finally":[163],"succeed":[164],"having":[166],"interoperable":[169],"unforgeable":[171],"solution,":[173],"being":[174],"easily":[175],"adoptable":[176],"manageable.":[178]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
