期刊文献+

Web环境下对可信网络连接的扩展研究

下载PDF
导出
摘要 可信网络连接(TNC)是近年来出现的一种网络访问控制(NAC)技术.传统的NAC系统主要集中于鉴别机制,也就是说,禁止非授权的设备接人局域网.然而,当安全状态比较可疑的网络设备请求连接入网时,它们却做不到禁止其连接.当网络设备处于不合适的安全状态,如没有安全更新、没有合适的防病毒软件或个人防火墙软件,它们就会威胁服务器和同一网络中其他工作站的安全.
作者 余以胜
出处 《华东师范大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第4期137-140,共4页 Journal of East China Normal University(Natural Science)
  • 相关文献

参考文献7

  • 1Trusted Computing Group. TCG trusted network connect TNC architecture for interoperability-specification version 1.3[EB/OL]. [2008-09-15]. https://www. trustedcomputinggroup. org/specs/TNC/.
  • 2刘宏伟,卫国斌.可信计算在VPN中的应用[J].计算机应用,2006,26(12):2935-2937. 被引量:4
  • 3NICK R, JOHN H. Security assertion markup language (SAML) V2.0 technical overview[EB/OL]. [2008-09- 15]. http://www. oasis-open. org/committees/tc_ home. php? wg_abbrev = security.
  • 4Trusted Computing Group. TCG trusted network connect TNC IF-IMC[EB/OL]. [2008-09-15]. https://www. trustedcomputinggroup. org/specs/TNC/.
  • 5Trusted Computing Group. TCG trusted network connect TNC IF-IMV[EB/OL]. [2008-09-15]. https://www. trustedcomputinggroup.org/specs/TNC/.
  • 6Trusted Computing Group. TCG specification architecture overview version 1.4[EB/OL]. [2008-09-15]. https: // www. trustedcomputinggroup. org/specs/TNC/.
  • 7SADEGHI A, STUBI.E C. Property based attestation for computing platforms: caring about properties,not mechanisms[C] // NSPW'04:Proceedings of the 2004 workshop on New security paradigms. New York: ACM Inc,2004.

二级参考文献5

  • 1李军.渐成热门的网络端点安全技术[J].计算机安全,2005(1):14-16. 被引量:8
  • 2TRUSTED COMPUTING GROUP.TCG Trusted Network Connect TNC Architecture for Interoperability[EB/OL].https://www.trustedcomputinggroup.org/downloads/specifications,2005.
  • 3TRUSTED COMPUTING GROUP.TPM Main Part 1 Design Principles[EB/OL].https://www.trustedcomputinggroup.org/downloads/specifications,2005.
  • 4TRUSTED COMPUTING GROUP.TCG Specification Architecture Overview Revision 1.2[EB/OL].https://www.trustedcomputinggroup.org/downloads/specifications,2004.
  • 5XIA HD,KANCHANA J,BRUSTOLONI JC.ENFORCEMENT OF SECURITY POLICY COMPLIANCE IN VIRTUAL PRIVATE NETWORKS[EB/OL].http://www.cs.pitt.edu,2005.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部