Cost Effective RADIUS Authentication for Wireless Clients
Journal Title: Database Systems Journal - Year 2010, Vol 1, Issue 2
Abstract
Network administrators need to keep administrative user information for each network device, but network devices usually support only limited functions for user management. WLAN security is a modern problem that needs to be solved and it requires a lot of overhead especially when applied to corporate wireless networks. Administrators can set up a RADIUS server that uses an external database server to handle authentication, authorization, and accounting for network security issues.
Authors and Affiliations
Alexandru ENACEANU, Gabriel GARAIS
Commercially Available Data Mining Tools used in the Economic Environment
This paper presents some of the most common commercially available data mining tools, with their most important features, side by side, and some considerations regarding the evaluation of data mining tools by companies t...
Data mining in Cloud Computing
This paper describes how data mining is used in cloud computing. Data Mining is used for extracting potentially useful information from raw data. The integration of data mining techniques into normal day-to-day activitie...
SAS Enterprise Data Integration Server - A Complete Solution Designed To Meet the Full Spectrum of Enterprise Data Integration Needs
This paper is about why is Data Integration important for organisations around the world. Organizations struggle daily with the challenges of large distributed data volumes, inconsistently defined data across dispa...
The Optimization of Algorithms in the Process of Temporal Data Mining Using the Compute Unified Device Architecture
Considering the importance and usefulness of real time data mining, in recent years the concern of researchers to discover new hardware architectures that can manage and process large volumes of data has increased si...
Implementation of Cloud Computing into VoIP
This article defines Cloud Computing and highlights key concepts, the benefits of using virtualization, its weaknesses and ways of combining it with classical VoIP technologies applied to large scale businesses. The anal...