期刊文献+

一种专用可信网络 被引量:4

Private Trusted Network
下载PDF
导出
摘要 为实现一个可信的专用网络,结合可信计算技术,利用组合公钥算法将可信终端的信任链引入专用网络.采用闪存密钥技术弥补了组合公钥算法易受共谋攻击的缺点,建立了,专用可信网络模型,以密码管理和安全管理为中心构建了综合安全防护系统,实现了专用网络的安全性、真实性、可控性和可靠性. In order to realize a trusted private network, firstly, trusted computing technologies are utilized. Then with the use of combined public key algorithm (CPK), the trust chain from trustworthy terminal can be led into private networks, and the USB Key technique is used to overcome the weakness of CPK. Finally, with the cryptogram management and security management as the center, a comprehensive secure defensive system is constructed, and a trusted network model is established to realize security, authenticity, controllability and reliability of private networks.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2006年第11期1032-1036,共5页 Journal of Beijing University of Technology
基金 北京市重点建设基金资助项目(4010001202111) 北京市优秀人才培养专项经费资助项目(20042D0501504).
关键词 可信网络 可信计算 组合公钥 安全性 trusted network trusted computing combined public key (CPK) security
  • 相关文献

参考文献6

二级参考文献28

  • 1余彦峰,刘毅,张书杰,段立娟.一种专用可信网络[J].北京工业大学学报,2006,32(11):1032-1036. 被引量:4
  • 2Floyd S. High-Speed TCP for large congestion windows. RFC3649, 2003.
  • 3DataTAG. http://datatag.web.cern.ch/datatag/networking.html
  • 4Corson MS. Internet-Based mobile ad hoc networking. IEEE Internet Computing, 1999. 63-70.
  • 5Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38:393-422.
  • 6Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: Scalable coordinate in sensor network. In: Proc. of the 5th ACM/IEEE Int'l Conf. on Mobile Computing and Networking. 1999. 263-270.
  • 7Saltzer H, Reed DP, Clark D. End to end argument in system design. ACM Trans. on Computing System, 1984,2(4):277-288.
  • 8Tennenhouse DL, Wetherall D. Towards an active network architecture. Computer Communication Review, 1996,26(2):21-28.
  • 9Yemini Y, Silva S. Towards programmable networks. In: Proc. of the IFIP/IEEE Int'l Workshop on Distributed Systems:Operations and Management. 1996.
  • 10Bhattacharjee S, Calvert KL, Zegura EW. Commentaries on ‘Active Networking and End to End Argument'. IEEE Network, 1998,12(3):66-71.

共引文献92

同被引文献27

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部