期刊文献+

可信网络连接的全生命周期授权模型及应用 被引量:2

Entire Lifecycle Authorization Model of Trusted Network Connection and Its Application
下载PDF
导出
摘要 现有的可信网络连接模型只对接入网络前的终端进行授权判断,缺乏接入网络过程中对终端的动态实时控制和自动调用网络接入授权判断,因而无法应对复杂多变的网络环境和突发的网络攻击。文章充分利用使用控制模型的属性可变性和授权决策持续性的优势,把可信网络连接和使用控制模型有机结合,将可信网络连接中远程证明机制评估远程用户的可信度作为系统在进行授权判断时的重要依据,提出了一种基于改进的使用控制模型的可信网络连接的全生命周期授权模型,保证了终端接入网络全生命周期的完整性。最后,基于该模型提供了电子消费领域的一个应用实例。 The terminal is only measured before it accessed network in existing trusted network connection model, and can not be measured in the process of accessing network, so it is unable to be supposed to the mutable complex network environment and the sharp-edged network attack. This article makes full of usage control model superiority, and unifies the usage control model and the trusted network connection. The trusted degree that remote attention mechanism evaluated is added to the process of authorization. A entire lifecycle authorization model of trusted network connection based improved usage control model is proposed, thereby ensure the integrity of terminals all lifecycle. In the end, a application is described.
出处 《计算机与数字工程》 2009年第8期118-123,共6页 Computer & Digital Engineering
关键词 属性可变性 过程中授权 电子商务 全生命周期完整性 mutability of attitude, authorization during process, E-commerce, integrity of entire lifecycle
  • 相关文献

参考文献15

  • 1沈昌祥.构造积极防御的安全保障框架[J].计算机安全,2003(32):1-2. 被引量:12
  • 2Hilley S. Trusted computing-path to security or road to servitude infosecurity Today[J]. 2004,1(4) :18-21.
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 4张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 5Cisco System Inc. Network Admission Control Framework Deployment Guide[EB/OL]. http://www. cisco. com/ en/US/solutions/ns340/ns394/ns171/ns466/ns617/net _ design_guidance0900aecd80417226. pdf. 2007- 10- 26.
  • 6Microsoft. Network Access Protection Platform Architecture [ EB/OL ]. http://www. microsoft. com/ downloads/details. aspx? familyid =2f37651e-1749-45c3- 996e-53de05d44ef7&displaylang=en. February 2008.
  • 7Trusted Computing Group. TCG Trusted Network Connect TNC Architecture for Interoperability. Specification v1. 3 Rev6 [EB/OL]. www. trustedcomputinggroup. org, 2008,4.
  • 8郑宇,何大可,何明星.基于可信计算的移动终端用户认证方案[J].计算机学报,2006,29(8):1255-1264. 被引量:40
  • 9林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 10March 30, 2006Sailer R, Zhang X L, Jaeger T, et al. Design and Implementation of a TCG-based Integrity Measurement Architecture[C]. In: Proceedings of 13th USENIX Security Symposium, Security '04,2004.

二级参考文献71

共引文献697

同被引文献14

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部