Web环境下对可信网络连接的扩展研究
摘要
可信网络连接(TNC)是近年来出现的一种网络访问控制(NAC)技术.传统的NAC系统主要集中于鉴别机制,也就是说,禁止非授权的设备接人局域网.然而,当安全状态比较可疑的网络设备请求连接入网时,它们却做不到禁止其连接.当网络设备处于不合适的安全状态,如没有安全更新、没有合适的防病毒软件或个人防火墙软件,它们就会威胁服务器和同一网络中其他工作站的安全.
出处
《华东师范大学学报(自然科学版)》
CAS
CSCD
北大核心
2009年第4期137-140,共4页
Journal of East China Normal University(Natural Science)
参考文献7
-
1Trusted Computing Group. TCG trusted network connect TNC architecture for interoperability-specification version 1.3[EB/OL]. [2008-09-15]. https://www. trustedcomputinggroup. org/specs/TNC/.
-
2刘宏伟,卫国斌.可信计算在VPN中的应用[J].计算机应用,2006,26(12):2935-2937. 被引量:4
-
3NICK R, JOHN H. Security assertion markup language (SAML) V2.0 technical overview[EB/OL]. [2008-09- 15]. http://www. oasis-open. org/committees/tc_ home. php? wg_abbrev = security.
-
4Trusted Computing Group. TCG trusted network connect TNC IF-IMC[EB/OL]. [2008-09-15]. https://www. trustedcomputinggroup. org/specs/TNC/.
-
5Trusted Computing Group. TCG trusted network connect TNC IF-IMV[EB/OL]. [2008-09-15]. https://www. trustedcomputinggroup.org/specs/TNC/.
-
6Trusted Computing Group. TCG specification architecture overview version 1.4[EB/OL]. [2008-09-15]. https: // www. trustedcomputinggroup. org/specs/TNC/.
-
7SADEGHI A, STUBI.E C. Property based attestation for computing platforms: caring about properties,not mechanisms[C] // NSPW'04:Proceedings of the 2004 workshop on New security paradigms. New York: ACM Inc,2004.
二级参考文献5
-
1李军.渐成热门的网络端点安全技术[J].计算机安全,2005(1):14-16. 被引量:8
-
2TRUSTED COMPUTING GROUP.TCG Trusted Network Connect TNC Architecture for Interoperability[EB/OL].https://www.trustedcomputinggroup.org/downloads/specifications,2005.
-
3TRUSTED COMPUTING GROUP.TPM Main Part 1 Design Principles[EB/OL].https://www.trustedcomputinggroup.org/downloads/specifications,2005.
-
4TRUSTED COMPUTING GROUP.TCG Specification Architecture Overview Revision 1.2[EB/OL].https://www.trustedcomputinggroup.org/downloads/specifications,2004.
-
5XIA HD,KANCHANA J,BRUSTOLONI JC.ENFORCEMENT OF SECURITY POLICY COMPLIANCE IN VIRTUAL PRIVATE NETWORKS[EB/OL].http://www.cs.pitt.edu,2005.
-
1瑞星,张晓兵.巧用规则 上网无忧[J].电脑爱好者,2004(14):46-46.
-
2把危险挡在“墙”外[J].新电脑,2006,30(4):220-231.
-
3龚德良,黄春喜.在Linux下开发个人防火墙软件[J].郴州师范高等专科学校学报,2002,23(2):74-78.
-
4彭文波.个人防火墙软件综合评测[J].软件,2005,26(9):90-94.
-
5烟波.安全卫士——个人防火墙软件[J].玩电脑,2004(12):78-79.
-
68月病毒播报[J].电子制作.电脑维护与应用,2005(8):32-32.
-
7小金.亲手为电脑打造铜墙铁壁[J].新电脑,2006,30(4):232-235.
-
8张晓兵,常亮,小艳.个人防火墙之岁末风云[J].网上俱乐部(电脑安全专家),2004(12):17-19.
-
9叶兴茂.个人电脑中常见的安全风险与对策[J].国土资源信息化,2003(3):41-44.
-
10安全防护指南[J].个人电脑,2000(12):10-12.