A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity
— This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outl...
Uloženo v:
| Vydáno v: | Automatic control and computer sciences Ročník 57; číslo 8; s. 1116 - 1125 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Moscow
Pleiades Publishing
01.12.2023
Springer Nature B.V |
| Témata: | |
| ISSN: | 0146-4116, 1558-108X |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | —
This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outlined. This method can be used for network segmentation. |
|---|---|
| AbstractList | —
This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outlined. This method can be used for network segmentation. Abstract—This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outlined. This method can be used for network segmentation. |
| Author | Shilova, A. D. Vorob’eva, A. A. |
| Author_xml | – sequence: 1 givenname: A. D. surname: Shilova fullname: Shilova, A. D. email: bondareva.ad@yandex.ru organization: ITMO University – sequence: 2 givenname: A. A. surname: Vorob’eva fullname: Vorob’eva, A. A. organization: ITMO University |
| BookMark | eNp1kMtOwzAQRS1UJNrCB7CzxDrgVxJnWaoClQosAhK7KHFsaCl28KOoW74ch6KyQCxGI829545mRmCgjZYAnGJ0TjGiFyXCLGMYZ4QijmIdgCFOU55gxJ8GYNjLSa8fgZFzK4SixrMh-JzAW-lfTAuNgnfSfxj7CidCSOfg1GhvzRoqY-FMu2CX-nnvmWtla-dtED5YCUspou638LJ2MobpONnIb6IMnbRqHUxwezpGayn8chORY3Co6rWTJz99DB6vZg_Tm2Rxfz2fThaJIBn3SZ1njCraZBlpWtwgQepcSY7rggnKaYEbphgTjIg8bznmlLcFz1Uu0oIpkVM6Bme73M6a9yCdr1YmWB1XVpSkjDNMEIsuvHMJa5yzUlWdXb7VdlthVPWvrv68OjJkx7iuv1ja3-T_oS8Gt4Oa |
| Cites_doi | 10.1002/9781118600245.ch3 10.1007/978-3-031-29097-8_59 10.32603/2071-2340-2021-1-21-45 10.23919/fruct53335.2021.9599989 10.3390/app11199183 10.21122/2309-4923-2018-3-55-61 10.1016/j.jksuci.2016.11.008 |
| ContentType | Journal Article |
| Copyright | Allerton Press, Inc. 2023. ISSN 0146-4116, Automatic Control and Computer Sciences, 2023, Vol. 57, No. 8, pp. 1116–1125. © Allerton Press, Inc., 2023. Russian Text © The Author(s), 2023, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy. Allerton Press, Inc. 2023. |
| Copyright_xml | – notice: Allerton Press, Inc. 2023. ISSN 0146-4116, Automatic Control and Computer Sciences, 2023, Vol. 57, No. 8, pp. 1116–1125. © Allerton Press, Inc., 2023. Russian Text © The Author(s), 2023, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy. – notice: Allerton Press, Inc. 2023. |
| DBID | AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
| DOI | 10.3103/S0146411623080308 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland ProQuest SciTech Premium Collection Technology Collection Advanced Technologies & Aerospace Collection ProQuest Central Essentials - QC ProQuest Central ProQuest Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central - New (Subscription) url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1558-108X |
| EndPage | 1125 |
| ExternalDocumentID | 10_3103_S0146411623080308 |
| GroupedDBID | -59 -5G -BR -EM -Y2 -~C -~X .86 .VR 06D 0R~ 0VY 1N0 23N 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 4.4 408 40D 40E 5GY 5VS 6NX 8TC 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABDZT ABECU ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACCUX ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADRFC ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AETLH AEVLU AEXYK AFBBN AFFNX AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AI. AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ AXYYD B-. BA0 BDATZ BGNMA CAG COF CS3 DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 H13 HF~ HG6 HLICF HMJXF HRMNR HZ~ IJ- IKXTQ IWAJR I~X I~Z J-C JBSCW JZLTJ KOV LLZTM M4Y MA- NPVJJ NQJWS NU0 O9- O93 O9J P9O PF0 PT4 QOS R89 R9I RNS ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TN5 TSG TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW VH1 W48 WK8 XU3 YLTOR Z7R Z83 Z88 ZMTXR ~A9 AAPKM AAYXX ABDBE ABFSG ABJCF ABRTQ ACSTC AEZWR AFDZB AFFHD AFHIU AFKRA AFOHR AHPBZ AHWEU AIXLP ARAPS ATHPR BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS 8FE 8FG AZQEC DWQXO GNUQQ JQ2 L6V P62 PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c268t-a7643f3b662bd1b0c2a7fe81a94c38391b4f44c42c77d81838d987f7c594fc733 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001174314700030&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0146-4116 |
| IngestDate | Sun Sep 28 03:52:14 EDT 2025 Sat Nov 29 05:52:12 EST 2025 Fri Feb 21 02:41:48 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 8 |
| Keywords | information security network infrastructure access control firewall |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c268t-a7643f3b662bd1b0c2a7fe81a94c38391b4f44c42c77d81838d987f7c594fc733 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 3254841204 |
| PQPubID | 2043879 |
| PageCount | 10 |
| ParticipantIDs | proquest_journals_3254841204 crossref_primary_10_3103_S0146411623080308 springer_journals_10_3103_S0146411623080308 |
| PublicationCentury | 2000 |
| PublicationDate | 20231200 2023-12-00 20231201 |
| PublicationDateYYYYMMDD | 2023-12-01 |
| PublicationDate_xml | – month: 12 year: 2023 text: 20231200 |
| PublicationDecade | 2020 |
| PublicationPlace | Moscow |
| PublicationPlace_xml | – name: Moscow – name: New York |
| PublicationTitle | Automatic control and computer sciences |
| PublicationTitleAbbrev | Aut. Control Comp. Sci |
| PublicationYear | 2023 |
| Publisher | Pleiades Publishing Springer Nature B.V |
| Publisher_xml | – name: Pleiades Publishing – name: Springer Nature B.V |
| References | Li, M., Cheng, H., Cao, W., Yu, S., and Song, J., Access control method of SDN network based on zero trust, Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022), Abawajy, J., Xu, Z., Atiquzzaman, M., and Zhang, X., Eds., Lecture Notes on Data Engineering and Communications Technologies, vol. 170, Cham: Springer, 2023, pp. 496–504. https://doi.org/10.1007/978-3-031-29097-8_59 StarkovD.I.ZhukovV.G.Automated firewall rule filtering based on the list of allowed network servicesReshetnevskie Chteniya20182348349 Petrov, S.N., Akhramenko, D.V., Goroshko, S.M., and Pulko, T.A., Access control in a local network using basic options of network equipment, Sist. Anal. Prikl. Inf., 2018, no. 3. https://doi.org/10.21122/2309-4923-2018-3-55-61 KhoumsiA.ErradiM.KrombiW.A formal basis for the design and analysis of firewall security policiesJ. King Saud Univ. Comput. Inf. Sci.201830516610.1016/j.jksuci.2016.11.008 TanenbaumA.S.Computer Networks2003Upper Saddle River, N.J.Prentice Hall Bondareva, A.D., Issues of assuring security in a network infrastructure by means of network segmentation, Sbornik trudov X Kongressa molodykh uchenykh (Proc. 10th Congress of Young Scientists), St. Petersburg, 2021, St. Petersburg: Nats. Issled. Univ. ITMO, 2021, vol. 1, pp. 31–35. Melnikov, B. and Melnikova, E., On the classical version of the branch and bound method, Komp’yuternye Instrum. Obrazovanii, 2021, no. 1, pp. 21–44. https://doi.org/10.32603/2071-2340-2021-1-21-45 CharonI.HudryO.Branch-and-bound methods, Concepts of Combinatorial Optimization201310.1002/9781118600245.ch3 AnwarR.W.AbdullahT.PastoreF.Firewall best practices for securing smart healthcare environment: A reviewAppl. Sci.20211191831:CAS:528:DC%2BB3MXit1KjtrzK10.3390/app11199183 Mordvin, D.V., Abramov, E.C., Sidorov, I.D., and Andreev, A.V., Method of automated construction of filtration rules of network traffic, Materialy mezhdunarodnoi nauchno-tekhnicheskoi konferentsii Kibernetika i vysokie tekhnologii veka (Proc. Int. Sci.-Tech. Conf. on Cybernetics and High Technologies of the Century), 2010. Musatov, V.K., Substantiation of efficiency in applying autocorrection of filtration rule bases in tools of internetwork screening, T-Comm: Telekommunikatsii Transp., 2014, no. 8, pp. 68–72. Bondareva, A. and Shilov, I., Method of grouping subjects and objects in information systems, 2021 30th Conf. of Open Innovations Association FRUCT, Oulu, Finland, 2021, IEEE, 2021, pp. 10–15. https://doi.org/10.23919/fruct53335.2021.9599989 KheirkhabarovT.S.The algorithm of network traffic filtering rules ordering in firewall rule setsReshetnevskie Chteniya20142334336 7675_CR1 A. Khoumsi (7675_CR4) 2018; 30 7675_CR7 7675_CR11 7675_CR8 7675_CR10 7675_CR12 7675_CR9 T.S. Kheirkhabarov (7675_CR5) 2014; 2 D.I. Starkov (7675_CR6) 2018; 2 R.W. Anwar (7675_CR3) 2021; 11 I. Charon (7675_CR13) 2013 A.S. Tanenbaum (7675_CR2) 2003 |
| References_xml | – reference: TanenbaumA.S.Computer Networks2003Upper Saddle River, N.J.Prentice Hall – reference: Bondareva, A.D., Issues of assuring security in a network infrastructure by means of network segmentation, Sbornik trudov X Kongressa molodykh uchenykh (Proc. 10th Congress of Young Scientists), St. Petersburg, 2021, St. Petersburg: Nats. Issled. Univ. ITMO, 2021, vol. 1, pp. 31–35. – reference: Melnikov, B. and Melnikova, E., On the classical version of the branch and bound method, Komp’yuternye Instrum. Obrazovanii, 2021, no. 1, pp. 21–44. https://doi.org/10.32603/2071-2340-2021-1-21-45 – reference: AnwarR.W.AbdullahT.PastoreF.Firewall best practices for securing smart healthcare environment: A reviewAppl. Sci.20211191831:CAS:528:DC%2BB3MXit1KjtrzK10.3390/app11199183 – reference: Li, M., Cheng, H., Cao, W., Yu, S., and Song, J., Access control method of SDN network based on zero trust, Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022), Abawajy, J., Xu, Z., Atiquzzaman, M., and Zhang, X., Eds., Lecture Notes on Data Engineering and Communications Technologies, vol. 170, Cham: Springer, 2023, pp. 496–504. https://doi.org/10.1007/978-3-031-29097-8_59 – reference: KheirkhabarovT.S.The algorithm of network traffic filtering rules ordering in firewall rule setsReshetnevskie Chteniya20142334336 – reference: Bondareva, A. and Shilov, I., Method of grouping subjects and objects in information systems, 2021 30th Conf. of Open Innovations Association FRUCT, Oulu, Finland, 2021, IEEE, 2021, pp. 10–15. https://doi.org/10.23919/fruct53335.2021.9599989 – reference: StarkovD.I.ZhukovV.G.Automated firewall rule filtering based on the list of allowed network servicesReshetnevskie Chteniya20182348349 – reference: KhoumsiA.ErradiM.KrombiW.A formal basis for the design and analysis of firewall security policiesJ. King Saud Univ. Comput. Inf. Sci.201830516610.1016/j.jksuci.2016.11.008 – reference: Mordvin, D.V., Abramov, E.C., Sidorov, I.D., and Andreev, A.V., Method of automated construction of filtration rules of network traffic, Materialy mezhdunarodnoi nauchno-tekhnicheskoi konferentsii Kibernetika i vysokie tekhnologii veka (Proc. Int. Sci.-Tech. Conf. on Cybernetics and High Technologies of the Century), 2010. – reference: Musatov, V.K., Substantiation of efficiency in applying autocorrection of filtration rule bases in tools of internetwork screening, T-Comm: Telekommunikatsii Transp., 2014, no. 8, pp. 68–72. – reference: Petrov, S.N., Akhramenko, D.V., Goroshko, S.M., and Pulko, T.A., Access control in a local network using basic options of network equipment, Sist. Anal. Prikl. Inf., 2018, no. 3. https://doi.org/10.21122/2309-4923-2018-3-55-61 – reference: CharonI.HudryO.Branch-and-bound methods, Concepts of Combinatorial Optimization201310.1002/9781118600245.ch3 – volume: 2 start-page: 348 year: 2018 ident: 7675_CR6 publication-title: Reshetnevskie Chteniya – ident: 7675_CR11 – volume-title: Computer Networks year: 2003 ident: 7675_CR2 – volume-title: Branch-and-bound methods, Concepts of Combinatorial Optimization year: 2013 ident: 7675_CR13 doi: 10.1002/9781118600245.ch3 – ident: 7675_CR9 doi: 10.1007/978-3-031-29097-8_59 – ident: 7675_CR12 doi: 10.32603/2071-2340-2021-1-21-45 – volume: 2 start-page: 334 year: 2014 ident: 7675_CR5 publication-title: Reshetnevskie Chteniya – ident: 7675_CR10 doi: 10.23919/fruct53335.2021.9599989 – volume: 11 start-page: 9183 year: 2021 ident: 7675_CR3 publication-title: Appl. Sci. doi: 10.3390/app11199183 – ident: 7675_CR7 – ident: 7675_CR8 – ident: 7675_CR1 doi: 10.21122/2309-4923-2018-3-55-61 – volume: 30 start-page: 51 year: 2018 ident: 7675_CR4 publication-title: J. King Saud Univ. Comput. Inf. Sci. doi: 10.1016/j.jksuci.2016.11.008 |
| SSID | ssj0055886 |
| Score | 2.2585657 |
| Snippet | —
This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing... Abstract—This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 1116 |
| SubjectTerms | Access control Algorithms Computer Science Control methods Control Structures and Microprogramming Design Firewalls Infrastructure Internet service providers Network security Restrictions Routers Security Workloads |
| SummonAdditionalLinks | – databaseName: Engineering Database dbid: M7S link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFA46PejB3-J0Sg6elLKlTZvkJHNsKOgQprJbabIGBGlnu-4P8C_3JW03f6AXr2n7WvqSvC95X96H0DmREPMEIDfhy9ihGoaihMBlDvjY8KqYLV_8fMeGQz4ei4dqwy2vaJX1nGgn6kmqzB5524OVDKfE7dCr6ZtjVKNMdrWS0FhFa6ZKArHUvVE9E_s-t0qPpj6KQwkJyqymUdZqG1JTYNoAgnNTs-VrXFqCzW_5URt2Btv__eAdtFUBTtwte8guWomTPbT5qQzhPnrv4nsrJI1TjYclLxx3rZIi7pVUdgzYFveT3B5qXNxzm-gsKivQFlmMR5UWHr6G0AjGEmiZ23fgUTGNM_1apEW-eNpybFSpXnGAngb9x96NU2kzOMoN-MyJGEAZ7ckgcOWEyI5yI6ZjTiJBFSx6BZFUU6ooOJtNABR4fCI400z5gmrFPO8QNZI0iY8Q7ihPSO4q7QpphJAlWCbK5bGnVOAKv4kuas-E07IERwhLF-PG8Icbm6hVeyOsRmMeLl3RRJe1P5eXfzV2_LexE7RhxOdLcksLNeB3x6doXc1nL3l2ZrviB7om41A priority: 102 providerName: ProQuest |
| Title | A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity |
| URI | https://link.springer.com/article/10.3103/S0146411623080308 https://www.proquest.com/docview/3254841204 |
| Volume | 57 |
| WOSCitedRecordID | wos001174314700030&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1558-108X dateEnd: 20241209 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: P5Z dateStart: 20230201 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1558-108X dateEnd: 20241209 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: K7- dateStart: 20230201 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database (subscription) customDbUrl: eissn: 1558-108X dateEnd: 20241209 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: M7S dateStart: 20230201 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central - New (Subscription) customDbUrl: eissn: 1558-108X dateEnd: 20241209 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: BENPR dateStart: 20230201 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1558-108X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: RSV dateStart: 20070201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLZgcIADb8R4TDlwAlWsTdokxw1tAgHTxAAhLtWSNRIS6qZ12w_gl-OkLeN5gEsPretWcZLPVmx_AMe-QsyT6LnJUCUeM7gUFQKXLfBx8Kq5a1_8cM07HfH4KLtFHXdWZruXR5Jup3ZxZZ2e2TSkiPk-4jV6OdQW-C4h2gnL13Dbeyi33zAUjt7RSntWPD_K_FnFZzCae5hfDkUd1rTX__WXG7BWuJakkc-FTVhI0i1YL2kbSLGKt2D1Qw_CbXhtkBvHIk2GhnTypHDScDSK5DzPYyfo2JJWmrmKxneZy9SM-3n72ek4Ib2CCI80ERdRWYp3Zu4bpDcdJWPzMh1Os_e3XYKNzqkrduC-3bo7v_AKYgZPB5GYeH2OfoyhKooCNfBVXQd9bhLh9yXTGPFKXzHDmGZoaT5Aj4CKgRTccB1KZjSndBcq6TBN9oDUNZVKBNoEUlkWZIWafR2IhGodBTKswklpoXiU99-IMW6xYx1_G-sqHJY2jIulmMUUQ2DB_KDOqnBa2mz--Fdl-3-SPoAVS0SfJ7ocQgVHPzmCZT2bPGfjGiw1W53ubQ0Wr7hXs_mlPbx2w6eam7tvUUPipw |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LTxsxEB4hQAIObXmpaWnxAS6gFVmvd20fqiqlIKKECImHuC2xY0tI1SZkCYgrP6i_sWM7SygIbhy47mN2Zc_MN2OP5wPYiBVinsTITabKRMyiKSoELnfAx8Or5r598Vmbdzri_FweTcHf6iyMK6usfKJ31L2-dmvkOwlmMoLFtM5-Dq4ixxrldlcrCo2gFi1zd4spW_mj-Rvnd5PS_b2T3YNozCoQaZqJ66jLEYRtorKMql6s6pp2uTUi7kqmMV2TsWKWMc3wN3kP4SwRPczLLdepZFZztwCKLn-GJYI7u2rxqPL8aSo8s6TrxxKxOM7CLqpj8tpxRVSZu4Yhv3A9Yv7HwUlw-2Q_1sPc_sf3NkCf4MM4oCaNYAGLMGWKJVh41GZxGe4b5NATZZO-JZ1Q904animS7IZSfYKxO9krSn9o8-GZZmGH3dBhdzQ05HjM9Ud-IfSjsAKv3PhvkOPRwAztn1F_VD687WuIdGDnWIHTNxmEVZgu-oX5DKSuE6kE1ZZK5YieFUqONRUm0TqjMq3BVqUJ-SC0GMkxNXNqkz9TmxqsVbOfj71NmU-mvgbblf5Mbr8o7MvrwtZh7uDksJ23m53WV5inGN6FQp41mMahN99gVt9cX5bD794MCFy8tVr9A-JXPvQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT8MwDLYQIAQHHgPEeObACVRtbdI2OY6xiQmYkAaIW7VkjYSEumnd-AH8cpyk3XgeENfWdas4qW35sz-AU1-izxMYuYlQph7TeBQlOi7T4GPdq4rt-OLHm7jb5U9P4q7gOc1LtHtZknQ9DWZKUzapjQa6ZnPMOq0ZSFLEfB99N0Y81DT7LjGDozfpeu-x_BWHIbdUj0baM-KurPmzis-OaR5tfimQWr_T3vj3F2_CehFykobbI1uwkGYV2CjpHEhxuiuw9mE24Ta8NcitZZcmQ026DixOGpZekTQdvp1gwEtaWW47HWcynUyP-24s7XSckl5BkEcu0F-isgyvvNp3kN50lI71y3Q4zWdPW-CNcpQWO_DQbt03r7yCsMFTQcQnXj_G-EZTGUWBHPiyroJ-rFPu9wVTmAkLXzLNmGK4A-IBRgqUDwSPdaxCwbSKKd2FxWyYpXtA6ooKyQOlAyENO7JEzb4KeEqVigIRVuGstFYycnM5EsxnzFon39a6CoelPZPiiOYJxdSYMz-osyqcl_ab3_5V2f6fpE9g5e6yndx0utcHsGq46h0W5hAW0RDpESyr18lzPj62G_cdg7_qDQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Method+of+Network+Access+Control+for+Ensuring+Network+Infrastructure+Security+Based+on+Severing+Superfluous+Network+Connectivity&rft.jtitle=Automatic+control+and+computer+sciences&rft.au=Shilova%2C+A.+D.&rft.au=Vorob%E2%80%99eva%2C+A.+A.&rft.date=2023-12-01&rft.pub=Pleiades+Publishing&rft.issn=0146-4116&rft.eissn=1558-108X&rft.volume=57&rft.issue=8&rft.spage=1116&rft.epage=1125&rft_id=info:doi/10.3103%2FS0146411623080308&rft.externalDocID=10_3103_S0146411623080308 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0146-4116&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0146-4116&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0146-4116&client=summon |