期刊文献+

EAP-TNC协议分析及应用

Analysis of EAP-TNC Protocol and Its Application
下载PDF
导出
摘要 在当今这个网络信息系统高度发达的时代,对于一个组织的网络管理员来说,要想知晓试图接入企业网络的设备的真实身份是一件十分困难的事情。面对手段高明、资金雄厚的黑客,用户设备很可能在不知不觉间感染致命的恶意软件。当前可信网络连接(TNC)技术就为解决这一难题提供一个网络接入控制解决方案,它能保护系统免受有病毒、蠕虫和其它恶意应用的PC和设备的侵害。文章分析了EAP-TNC协议[1]及其应用。 In the modern era of highly developed network information system,it is difficult for an organization's network administrators to know the true identity of the equipment which attempts to access corporate networks.Facing clever and well-funded hackers,users'e-quipments may unknowingly be infected with the deadly malicious software.Currently Trusted Network Connect(TNC) technology pro-vides a solution by network access control,which can protect the system from harms of viruses,worms and other malicious applications,PC and equipment.This paper analyzes the EAP-TNC protocol and its application.
作者 刘慧琳
出处 《四川教育学院学报》 2010年第11期114-116,共3页 Journal of Sichuan College of Education
关键词 可信网络连接 协议 接入控制 TNC protocol access control
  • 相关文献

参考文献4

  • 1Trusted Computing Group. TCG Trusted Network Connect TNC Architecture for Interoperability Specification Version 1. 2 Revision4 [ S/OL]. https ://www. trustedcomputinggroup. org/specs/TNC ,21 May 2007.
  • 2Trusted Computing Group. TCG Trusted Network Connect TNC IF -TNCCS Specification Version 1.1 Revision 1. 00. [ S/OL] https://www. trustedcomputinggroup. org/specs/TNC, February 2007.
  • 3B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, Ed.. Extensible Authentication Protocol ( EAP ) [ M ]. Internet Engineering Task Force RFC3748, June 2004.
  • 4Trusted Computing Group. TCG Trusted Network Connect TNC IF - T: Protocol Bindings for Tunneled EAP Methods Specification Version 1. 1 Revision 10. [ S/ OL] https://www. trustedcomputinggroup.org/specs/ TNC,21 May 2007.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部