A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity

— This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outl...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Automatic control and computer sciences Jg. 57; H. 8; S. 1116 - 1125
Hauptverfasser: Shilova, A. D., Vorob’eva, A. A.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Moscow Pleiades Publishing 01.12.2023
Springer Nature B.V
Schlagworte:
ISSN:0146-4116, 1558-108X
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract — This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outlined. This method can be used for network segmentation.
AbstractList — This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outlined. This method can be used for network segmentation.
Abstract—This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outlined. This method can be used for network segmentation.
Author Shilova, A. D.
Vorob’eva, A. A.
Author_xml – sequence: 1
  givenname: A. D.
  surname: Shilova
  fullname: Shilova, A. D.
  email: bondareva.ad@yandex.ru
  organization: ITMO University
– sequence: 2
  givenname: A. A.
  surname: Vorob’eva
  fullname: Vorob’eva, A. A.
  organization: ITMO University
BookMark eNp1kMtOwzAQRS1UJNrCB7CzxDrgVxJnWaoClQosAhK7KHFsaCl28KOoW74ch6KyQCxGI829545mRmCgjZYAnGJ0TjGiFyXCLGMYZ4QijmIdgCFOU55gxJ8GYNjLSa8fgZFzK4SixrMh-JzAW-lfTAuNgnfSfxj7CidCSOfg1GhvzRoqY-FMu2CX-nnvmWtla-dtED5YCUspou638LJ2MobpONnIb6IMnbRqHUxwezpGayn8chORY3Co6rWTJz99DB6vZg_Tm2Rxfz2fThaJIBn3SZ1njCraZBlpWtwgQepcSY7rggnKaYEbphgTjIg8bznmlLcFz1Uu0oIpkVM6Bme73M6a9yCdr1YmWB1XVpSkjDNMEIsuvHMJa5yzUlWdXb7VdlthVPWvrv68OjJkx7iuv1ja3-T_oS8Gt4Oa
Cites_doi 10.1002/9781118600245.ch3
10.1007/978-3-031-29097-8_59
10.32603/2071-2340-2021-1-21-45
10.23919/fruct53335.2021.9599989
10.3390/app11199183
10.21122/2309-4923-2018-3-55-61
10.1016/j.jksuci.2016.11.008
ContentType Journal Article
Copyright Allerton Press, Inc. 2023. ISSN 0146-4116, Automatic Control and Computer Sciences, 2023, Vol. 57, No. 8, pp. 1116–1125. © Allerton Press, Inc., 2023. Russian Text © The Author(s), 2023, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
Allerton Press, Inc. 2023.
Copyright_xml – notice: Allerton Press, Inc. 2023. ISSN 0146-4116, Automatic Control and Computer Sciences, 2023, Vol. 57, No. 8, pp. 1116–1125. © Allerton Press, Inc., 2023. Russian Text © The Author(s), 2023, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
– notice: Allerton Press, Inc. 2023.
DBID AAYXX
CITATION
8FE
8FG
ABJCF
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
DOI 10.3103/S0146411623080308
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest SciTech Premium Collection Technology Collection Materials Science & Engineering Database
ProQuest Central UK/Ireland
ProQuest SciTech Premium Collection Technology Collection Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Computer Science Database
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1558-108X
EndPage 1125
ExternalDocumentID 10_3103_S0146411623080308
GroupedDBID -59
-5G
-BR
-EM
-Y2
-~C
-~X
.86
.VR
06D
0R~
0VY
1N0
23N
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2~H
30V
4.4
408
40D
40E
5GY
5VS
6NX
8TC
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACCUX
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADRFC
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEMSY
AEOHA
AEPYU
AETLH
AEVLU
AEXYK
AFBBN
AFFNX
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AI.
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
AXYYD
B-.
BA0
BDATZ
BGNMA
CAG
COF
CS3
DDRTE
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
H13
HF~
HG6
HLICF
HMJXF
HRMNR
HZ~
IJ-
IKXTQ
IWAJR
I~X
I~Z
J-C
JBSCW
JZLTJ
KOV
LLZTM
M4Y
MA-
NPVJJ
NQJWS
NU0
O9-
O93
O9J
P9O
PF0
PT4
QOS
R89
R9I
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TN5
TSG
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
VH1
W48
WK8
XU3
YLTOR
Z7R
Z83
Z88
ZMTXR
~A9
AAPKM
AAYXX
ABDBE
ABFSG
ABJCF
ABRTQ
ACSTC
AEZWR
AFDZB
AFFHD
AFHIU
AFKRA
AFOHR
AHPBZ
AHWEU
AIXLP
ARAPS
ATHPR
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
K7-
M7S
PHGZM
PHGZT
PQGLB
PTHSS
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
L6V
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c268t-a7643f3b662bd1b0c2a7fe81a94c38391b4f44c42c77d81838d987f7c594fc733
IEDL.DBID M7S
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001174314700030&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0146-4116
IngestDate Sun Sep 28 03:52:14 EDT 2025
Sat Nov 29 05:52:12 EST 2025
Fri Feb 21 02:41:48 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords information security
network infrastructure
access control
firewall
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c268t-a7643f3b662bd1b0c2a7fe81a94c38391b4f44c42c77d81838d987f7c594fc733
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3254841204
PQPubID 2043879
PageCount 10
ParticipantIDs proquest_journals_3254841204
crossref_primary_10_3103_S0146411623080308
springer_journals_10_3103_S0146411623080308
PublicationCentury 2000
PublicationDate 20231200
2023-12-00
20231201
PublicationDateYYYYMMDD 2023-12-01
PublicationDate_xml – month: 12
  year: 2023
  text: 20231200
PublicationDecade 2020
PublicationPlace Moscow
PublicationPlace_xml – name: Moscow
– name: New York
PublicationTitle Automatic control and computer sciences
PublicationTitleAbbrev Aut. Control Comp. Sci
PublicationYear 2023
Publisher Pleiades Publishing
Springer Nature B.V
Publisher_xml – name: Pleiades Publishing
– name: Springer Nature B.V
References Li, M., Cheng, H., Cao, W., Yu, S., and Song, J., Access control method of SDN network based on zero trust, Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022), Abawajy, J., Xu, Z., Atiquzzaman, M., and Zhang, X., Eds., Lecture Notes on Data Engineering and Communications Technologies, vol. 170, Cham: Springer, 2023, pp. 496–504. https://doi.org/10.1007/978-3-031-29097-8_59
StarkovD.I.ZhukovV.G.Automated firewall rule filtering based on the list of allowed network servicesReshetnevskie Chteniya20182348349
Petrov, S.N., Akhramenko, D.V., Goroshko, S.M., and Pulko, T.A., Access control in a local network using basic options of network equipment, Sist. Anal. Prikl. Inf., 2018, no. 3. https://doi.org/10.21122/2309-4923-2018-3-55-61
KhoumsiA.ErradiM.KrombiW.A formal basis for the design and analysis of firewall security policiesJ. King Saud Univ. Comput. Inf. Sci.201830516610.1016/j.jksuci.2016.11.008
TanenbaumA.S.Computer Networks2003Upper Saddle River, N.J.Prentice Hall
Bondareva, A.D., Issues of assuring security in a network infrastructure by means of network segmentation, Sbornik trudov X Kongressa molodykh uchenykh (Proc. 10th Congress of Young Scientists), St. Petersburg, 2021, St. Petersburg: Nats. Issled. Univ. ITMO, 2021, vol. 1, pp. 31–35.
Melnikov, B. and Melnikova, E., On the classical version of the branch and bound method, Komp’yuternye Instrum. Obrazovanii, 2021, no. 1, pp. 21–44. https://doi.org/10.32603/2071-2340-2021-1-21-45
CharonI.HudryO.Branch-and-bound methods, Concepts of Combinatorial Optimization201310.1002/9781118600245.ch3
AnwarR.W.AbdullahT.PastoreF.Firewall best practices for securing smart healthcare environment: A reviewAppl. Sci.20211191831:CAS:528:DC%2BB3MXit1KjtrzK10.3390/app11199183
Mordvin, D.V., Abramov, E.C., Sidorov, I.D., and Andreev, A.V., Method of automated construction of filtration rules of network traffic, Materialy mezhdunarodnoi nauchno-tekhnicheskoi konferentsii Kibernetika i vysokie tekhnologii veka (Proc. Int. Sci.-Tech. Conf. on Cybernetics and High Technologies of the Century), 2010.
Musatov, V.K., Substantiation of efficiency in applying autocorrection of filtration rule bases in tools of internetwork screening, T-Comm: Telekommunikatsii Transp., 2014, no. 8, pp. 68–72.
Bondareva, A. and Shilov, I., Method of grouping subjects and objects in information systems, 2021 30th Conf. of Open Innovations Association FRUCT, Oulu, Finland, 2021, IEEE, 2021, pp. 10–15. https://doi.org/10.23919/fruct53335.2021.9599989
KheirkhabarovT.S.The algorithm of network traffic filtering rules ordering in firewall rule setsReshetnevskie Chteniya20142334336
7675_CR1
A. Khoumsi (7675_CR4) 2018; 30
7675_CR7
7675_CR11
7675_CR8
7675_CR10
7675_CR12
7675_CR9
T.S. Kheirkhabarov (7675_CR5) 2014; 2
D.I. Starkov (7675_CR6) 2018; 2
R.W. Anwar (7675_CR3) 2021; 11
I. Charon (7675_CR13) 2013
A.S. Tanenbaum (7675_CR2) 2003
References_xml – reference: TanenbaumA.S.Computer Networks2003Upper Saddle River, N.J.Prentice Hall
– reference: Bondareva, A.D., Issues of assuring security in a network infrastructure by means of network segmentation, Sbornik trudov X Kongressa molodykh uchenykh (Proc. 10th Congress of Young Scientists), St. Petersburg, 2021, St. Petersburg: Nats. Issled. Univ. ITMO, 2021, vol. 1, pp. 31–35.
– reference: Melnikov, B. and Melnikova, E., On the classical version of the branch and bound method, Komp’yuternye Instrum. Obrazovanii, 2021, no. 1, pp. 21–44. https://doi.org/10.32603/2071-2340-2021-1-21-45
– reference: AnwarR.W.AbdullahT.PastoreF.Firewall best practices for securing smart healthcare environment: A reviewAppl. Sci.20211191831:CAS:528:DC%2BB3MXit1KjtrzK10.3390/app11199183
– reference: Li, M., Cheng, H., Cao, W., Yu, S., and Song, J., Access control method of SDN network based on zero trust, Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022), Abawajy, J., Xu, Z., Atiquzzaman, M., and Zhang, X., Eds., Lecture Notes on Data Engineering and Communications Technologies, vol. 170, Cham: Springer, 2023, pp. 496–504. https://doi.org/10.1007/978-3-031-29097-8_59
– reference: KheirkhabarovT.S.The algorithm of network traffic filtering rules ordering in firewall rule setsReshetnevskie Chteniya20142334336
– reference: Bondareva, A. and Shilov, I., Method of grouping subjects and objects in information systems, 2021 30th Conf. of Open Innovations Association FRUCT, Oulu, Finland, 2021, IEEE, 2021, pp. 10–15. https://doi.org/10.23919/fruct53335.2021.9599989
– reference: StarkovD.I.ZhukovV.G.Automated firewall rule filtering based on the list of allowed network servicesReshetnevskie Chteniya20182348349
– reference: KhoumsiA.ErradiM.KrombiW.A formal basis for the design and analysis of firewall security policiesJ. King Saud Univ. Comput. Inf. Sci.201830516610.1016/j.jksuci.2016.11.008
– reference: Mordvin, D.V., Abramov, E.C., Sidorov, I.D., and Andreev, A.V., Method of automated construction of filtration rules of network traffic, Materialy mezhdunarodnoi nauchno-tekhnicheskoi konferentsii Kibernetika i vysokie tekhnologii veka (Proc. Int. Sci.-Tech. Conf. on Cybernetics and High Technologies of the Century), 2010.
– reference: Musatov, V.K., Substantiation of efficiency in applying autocorrection of filtration rule bases in tools of internetwork screening, T-Comm: Telekommunikatsii Transp., 2014, no. 8, pp. 68–72.
– reference: Petrov, S.N., Akhramenko, D.V., Goroshko, S.M., and Pulko, T.A., Access control in a local network using basic options of network equipment, Sist. Anal. Prikl. Inf., 2018, no. 3. https://doi.org/10.21122/2309-4923-2018-3-55-61
– reference: CharonI.HudryO.Branch-and-bound methods, Concepts of Combinatorial Optimization201310.1002/9781118600245.ch3
– volume: 2
  start-page: 348
  year: 2018
  ident: 7675_CR6
  publication-title: Reshetnevskie Chteniya
– ident: 7675_CR11
– volume-title: Computer Networks
  year: 2003
  ident: 7675_CR2
– volume-title: Branch-and-bound methods, Concepts of Combinatorial Optimization
  year: 2013
  ident: 7675_CR13
  doi: 10.1002/9781118600245.ch3
– ident: 7675_CR9
  doi: 10.1007/978-3-031-29097-8_59
– ident: 7675_CR12
  doi: 10.32603/2071-2340-2021-1-21-45
– volume: 2
  start-page: 334
  year: 2014
  ident: 7675_CR5
  publication-title: Reshetnevskie Chteniya
– ident: 7675_CR10
  doi: 10.23919/fruct53335.2021.9599989
– volume: 11
  start-page: 9183
  year: 2021
  ident: 7675_CR3
  publication-title: Appl. Sci.
  doi: 10.3390/app11199183
– ident: 7675_CR7
– ident: 7675_CR8
– ident: 7675_CR1
  doi: 10.21122/2309-4923-2018-3-55-61
– volume: 30
  start-page: 51
  year: 2018
  ident: 7675_CR4
  publication-title: J. King Saud Univ. Comput. Inf. Sci.
  doi: 10.1016/j.jksuci.2016.11.008
SSID ssj0055886
Score 2.2585657
Snippet — This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing...
Abstract—This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 1116
SubjectTerms Access control
Algorithms
Computer Science
Control methods
Control Structures and Microprogramming
Design
Firewalls
Infrastructure
Internet service providers
Network security
Restrictions
Routers
Security
Workloads
SummonAdditionalLinks – databaseName: SpringerLINK Contemporary 1997-Present
  dbid: RSV
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELVQYYCBQgFRKMgDEygisZ3YGUvVCgYqRAF1i2InlpBQWiVNfwC_nIudUD4HWJPzJTrbd-_kOz-EzlgaQCQF5BYQyE0A_0tH-q50fF8qAu4wUEoasgk-HovpNLyr-7iLptq9OZI0ntrklS69rMqQAuZ5EK8B5dCqwXcdop2o-BruJ0-N-_V9YegdK2mnErdHmT-r-ByMVgjzy6GoiTWj9r_-cgdt19AS9-1a2EVradZB7Ya2Ade7uIO2PtxBuIde-_jWsEjjmcZjWxSO-4ZGEQ9sHTsGYIuHWWE6Gt9lbjKdx_b62TJP8aQmwsNXEBdBWQZPluYbeFLO01y_lLOyeB9tCmyUpa7YR4-j4cPg2qmJGRxFArFwYg44RlMZBEQmnnQViblOhReHTEHGG3qSacYUI4rzBBABFUkouObKD5lWnNID1MpmWXqIsIzdhEJaowHpATZkIqY0jBNfkRCAj3C76LyZoWhu79-IIG-pbB19s3UX9Zo5jOqtWESgnQnmEZd10UUzZ6vXvyo7-pP0MdqsiOhtoUsPtcD66QnaUMvFc5GfmhX6BpFw3lg
  priority: 102
  providerName: Springer Nature
Title A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity
URI https://link.springer.com/article/10.3103/S0146411623080308
https://www.proquest.com/docview/3254841204
Volume 57
WOSCitedRecordID wos001174314700030&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 20241209
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: P5Z
  dateStart: 20230201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 20241209
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: K7-
  dateStart: 20230201
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 20241209
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: M7S
  dateStart: 20230201
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 20241209
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: BENPR
  dateStart: 20230201
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: RSV
  dateStart: 20070201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3JTsMwEB2xHeDAjiiUygdOoIgsduycUIuKQIiqooAQlyh2YgkJpaVp-QC-nLGTUBbBhUsOTuJEHmfmjf0yD-CQZiFGUkRuoY-5CeJ_6UjmSocxqXx0h6FS0opN8F5PPDxE_WrBraholbVPtI46HSqzRn4SYCYjqOe79HT04hjVKLO7WklozMOiqZLgWereoPbEjAmr9GjqozjU88JyV9Moa50YUlNo2hCCC1Oz5WtcmoHNb_ujNuycr_33hddhtQKcpF3OkA2Yy_JNWPlUhnAL3trk2gpJk6EmvZIXTtpWSZGclVR2gtiWdPPC_tT4cc1lrsdJWYF2Os7IoNLCIx0MjdhZji2v9hlkMB1lY_08HU6Lj7stx0aV6hXbcHfevT27cCptBkf5oZg4CUcoowMZhr5MPekqP-E6E14SUYVJb-RJqilV1FecpwgKApFGgmuuWES14kGwAwv5MM92gcjETXGwmEawh_CQiiQIoiRlyo8Q-wi3AUe1ZeJRWYIjxtTFmDH-YcYGNGtrxNXXWMQzUzTguLbn7PSvne393dk-LBvx-ZLc0oQFHO7sAJbU6-SpGLdgsdPt9W9aMH_FnZadmHjss0c83gzu3wEY1Ofp
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3fT9swED4hhrTxMNgPRLcO_LC9DEVNHCd2HhAqBdSqUE0qSH3LYieWkFDaNRTE6_6g_Y072027McFbH_bqJI7kO9995zvfB_CZFTF6UkRuMcXYBPG_9GTkSy-KpKJoDmOlpCWb4IOBGI2Sb2vwq74LY8oqa5toDXU-VuaMvBViJCNYQH12NPnhGdYok12tKTScWvSLh3sM2arD3gnK9wulZ6eXna43ZxXwFI3FrZdxdMI6lHFMZR5IX9GM60IEWcIUhmtJIJlmTDGqOM_RnYUix7hccxUlTCtuDkDR5L9goeBmX_W5V1v-KBKWWdL0Y_FYEMQui2qYvFqmiCo2Ywj5hekR87cfXILbR_lY6-bOtv63BdqG13NATdpuB7yBtaJ8C5t_tFl8Bz_b5MISZZOxJgNX907alimSdFypPkHsTk7Lyl7aXLzTK_U0cx12Z9OCDOdcf-QYXT9OVuLInf0HGc4mxVTfzMazavG1rSFSjp3jPVytZBF2YL0cl8UuEJn5OQon0ghmEf4ykYVhkuWRogliO-E34GutCenEtRhJMTQzapP-ozYNaNbST-fWpkqXom_AQa0_y8dPTvbh-cn24WX38uI8Pe8N-h_hFUV45wp5mrCOS198gg11d3tdTffsNiDwfdVq9RtfkT8H
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3fS8MwED5ERfTB-ROnU_Pgk1LWNmmbPs7pUNQhTMW30qQNCNKNddsf4F_uJWn97YP42l6vJZf0viNf7gM4YnmImRSRW-hjbYL4XzgicIUTBEL6-DsMpRRGbCLq9_njY3xb6ZyWNdu93pK0Zxp0l6Zi0h5lqm1qTJe2NSUpZJ6HuRsRD9WHfReY5tHrcn3wUP-Kg4AbqUdt7Whzu635s4vPiekdbX7ZIDV5p9f49xevwWoFOUnHzpF1mMuLDWjUcg6kWt0bsPKhN-EmvHTIjVGXJkNF-pYsTjpGXpF0Lb-dIOAl50VpTjq-2VwWapzatrTTcU4GlUAeOcV8ic4KvDIz7yCD6Sgfq-fpcFq-PW2IN9JKWmzBfe_8rnvhVIINjvRDPnHSCPGNoiIMfZF5wpV-Gqmce2nMJFbCsSeYYkwyX0ZRhkiB8izmkYpkEDMlI0q3Yb4YFvkOEJG6GcVyRyECRMzIeEppnGaB9GMERNxtwnEdrWRk-3IkWM_osU6-jXUTWnU8k2qJlgl6Z5x5vsuacFLH7_32r852_2R9CEu3Z73k-rJ_tQfLWqvecmFaMI-ByPdhUc4mT-X4wEzcV5qo6iA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Method+of+Network+Access+Control+for+Ensuring+Network+Infrastructure+Security+Based+on+Severing+Superfluous+Network+Connectivity&rft.jtitle=Automatic+control+and+computer+sciences&rft.au=Shilova%2C+A.+D.&rft.au=Vorob%E2%80%99eva%2C+A.+A.&rft.date=2023-12-01&rft.issn=0146-4116&rft.eissn=1558-108X&rft.volume=57&rft.issue=8&rft.spage=1116&rft.epage=1125&rft_id=info:doi/10.3103%2FS0146411623080308&rft.externalDBID=n%2Fa&rft.externalDocID=10_3103_S0146411623080308
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0146-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0146-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0146-4116&client=summon