期刊文献+

基于等级划分的可信接入和修复模型研究

Research on Trusted Access and Remediation Model Based on Grade Division
原文传递
导出
摘要 提出了一种基于等级划分的层次化可信接入框架和修复模型,详细说明了可信属性的划分规则和等级的评估方法以及修复模型的工作流程,着重阐明了基于该框架的实际应用和终端接入过程.仿真实验结果表明,框架在保证网络系统安全性和可信性的同时,能够增加终端接入网络的灵活性,并为各厂商可信网络设备的互联、互通和互操作提供支撑,而且修复模型部署简单,为不满足本地安全策略的终端提供方便可靠的修复服务. A framework of hiberarchy trusted access and remediation model based on the grade division were put forward,and the partition rules of trusted attributes,the methods of grade division as well as the work flow of remediation model were explained in detail.Moreover, the potential applications and the access procedure of terminals were discussed.Simulations results show that by the proposed framework,not only the safety and reliability of network can be ensured,but also the flexibility of ways to access network is strengthened,and that it can provide support for interoperability of different equipment manufacturers.It also can be concluded that the remediation model is easy to deploy and by which the convenient and reliable remediation services are able to be provided to those terminals who fail to meet the security policy.
出处 《数学的实践与认识》 CSCD 北大核心 2010年第17期84-99,共16页 Mathematics in Practice and Theory
基金 国家自然科学基金(60973136 61073164) 科技部国际科技合作交流专项项目(2008DFA12140) 欧盟合作项目(I55776-EM-1-2009-1-IT-ERAMUNDUS-ECW-LI2)
关键词 可信网络 接入控制 认证 可信属性 修复网络 trusted network access control authentication trusted attribute remediation network
  • 相关文献

参考文献18

  • 1MARK C. Trusted Computing - closing that lingering doubt[J]. Network Security, 2006, 2006(6): 13-15.
  • 2SIEWIOREK Daniel P.,杨孝宗,CHILLAREGE Ram,KALBARCZYK Zbigniew T..可信计算的产业趋势和研究(英文)[J].计算机学报,2007,30(10):1645-1661. 被引量:9
  • 3BALACHEFF B, CHEN L, PEARSON S, et al. Trusted Computing Platforms: TCPA Technology in Context[C]//Prentice Hall PTR, Upper Saddle River, N J, USA, 2002.
  • 4PEINADO M, CHEN Y, ENGLAND P, et al. NGSCB: A Trusted Open System//Proceedings of Information Security and Privacy[C]//Sydney, Australia. Springer, 2004, 86-97.
  • 5SESHADRI A, LUK M, PERRIG A, et al. Externally Verifiable Code Execution[C]//Communications of the ACM, 2006, 49(9): 45-49.
  • 6GASMI Y, SADEGHI A R, STEWIN P, et al. Beyond Secure Channels[A]. Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing. Alexandria, Virginia, USA. ACM, New York NY USA, 2007, 30-40.
  • 7CHEN L, ZHANG H G, ZHANG L Q, et al. A New Information Measurement Scheme Based on TPM for Trusted Network Access//Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops[C]//Harbin, China. IEEE, NW Washington, DC USA, 2007, 506-509.
  • 8LUO A A, LIN C, CHEN Z, et al. TNC-compatible NAC System implemented on Network Processor[C]//Proceedings of the 32nd IEEE Conference on Local Computer Networks. Clontarf Castle, Dublin, Ireland. IEEE, NW Washington, DC USA, 2007, 1069-1075.
  • 9VASILIADIS D C, RIZOS G E, STERIOU E, et al. A trusted network model using the lightweight directory access protocol//Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications[C]//Athens, Greece. WSEAS, Stevens Point Wisconsin USA, 2007, 252-256.
  • 10SCHELLEKENS D, WYSEUR B, PRENEEL B. Remote attestation on legacy operating systems with trusted platform modules[J]. Electronic Notes in Theoretical Computer Science, 2008, 197(1): 59-72.

二级参考文献102

共引文献104

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部