Modeling access control lists with discrete-time quasi birth-death processes

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper examines Access Control Lists (ACLs) that are used primarily in IP routers for providing network admission control and maintaining a certain level of Quality of Service. We present a method for modeling ACLs and firewall rules in various systems that use the same logic for their operation. Besides, we analyze the performance impact of ACLs on the packet forwarding capability of a router with discrete-time QBD processes. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Palugya, S., & Csorba, M. J. (2005). Modeling access control lists with discrete-time quasi birth-death processes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3733 LNCS, pp. 234–243). https://doi.org/10.1007/11569596_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free