期刊文献+

VPN中的动态端点准入控制机制研究 被引量:2

Research for Dynamic Endpoint Admission Control on VPN
下载PDF
导出
摘要 传统VPN的接入控制依赖于身份认证,而未考虑终端环境的动态变化,未能将客户终端的安全融入到VPN结构中去.本文提出DEAC(Dynamic Endpoint Admission Control,动态端点准入控制)机制,将终端安全状况和整个VPN系统相关联,使得VPN能够感知客户终端环境的变化,依靠具体情况动态实施访问控制;由终端环境和VPN服务构成一个整体,提高VPN拓扑的安全性. Entry control on traditional VPN bases on authentication. It has not considered the dynamic change of end environment and can not conform the security of user's terminal conditions to VPN framework. This paper presents DEAC(Dynamic Endpoint Admission Control), which correlates the end security to the whole VPN system. DEAC makes VPN apperceive the variety of user's terminal and implement dynamic access control by material instances. End environment and VPN service compose into one whole to improve the security of the VPN topology.
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第8期1377-1381,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60373088)资助
关键词 VPN 访问控制 端点 动态 VPN access control endpoint dynamic
  • 相关文献

参考文献9

  • 1Cohen R.On the establishment of an access VPN in broadband access networks[J].Communications Magazine,Feb.2003,IEEE,41(2):156-163.
  • 2Sandhu R S,Coyne E J,Feinstein H,et al.Role-based access control models[C].IEEE Computer,1996,29(2):38-47.
  • 3Thomas R K,Sandhu R S.Towards a task-based paradigm for flexible and adaptable access control in distributed applications[C].In:Proceedings on the 1992-1993 Workshop on New Security Paradigms,Little Compton,RI,1993:138-142.
  • 4Thomas R K,Sandhu R S.Conceptual foundations for a model of task-based authorizations[C].In:Proceedings of the 7th IEEE Computer Security Foundations Workshop,Franconia,NH,June 1994:66-79,
  • 5Naldurg P,Campbell R H.Dynamic access control policies in seraphim[R].Technical Report UIUCDCS-R-2002-2260,Computer Science Department,University of Illinois at Urbana-Champaign,February 2002.
  • 6Lawrence Teo.Dynamic and risk-aware network access management[C].SACMAT'03,June 2-3,2003:217-230
  • 7Ganta S.The expressive power of access control models[D].George Mason University,Fairfax,VA 22030,1995.
  • 8Mahesh V.Tripunitara,Li Ning-hui.Comparing the expressive power of access control models[C].In:Proceedings of the 11th ACM Conference on Computer and Communications Security Oct.2004.
  • 9Dierks T,Allen C.RFC2246,The TLS protocol version 1.0[S].January 1999.

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部