期刊文献+

可信网络接入技术改进研究 被引量:1

Research on Improvement of Trusted Network Access Technology
下载PDF
导出
摘要 可信网络接入使用可信计算技术来防止恶意终端访问受保护的网络,进而确保网络的安全,但目前可信网络接入系统都还存在一些安全和性能问题,影响其实际推广和使用。首先介绍可信网络接入的一些研究成果,然后基于这些研究工作总结出一个基本的网络接入模型和接入流程。通过对接入流程的分析,挖掘其可能存在的安全问题。最后针对这些安全问题,给出相应的改进方案。改进方案可以进一步加强网络接入系统的安全和性能,促进其推广使用。 Trusted Network Access (TNA) can ensure the security of internal network by using trusted computing technology, which can prevent malicious terminals from accessing the protected network. However, current TNA systems have some security issues and performance problems, which influence their popularization and application. In this paper, firstly some researches are introduced, and then a basic network access model and process based on these researches are concluded. By analyzing the access process, possible security problems of TNA are found. Finally, the paper gives some improved research methods according to these security problems. Improved mechanisms can further strengthen the security and performance of TNA systems, and promote their use.
作者 吴秋新
出处 《电视技术》 北大核心 2015年第14期45-50,54,共7页 Video Engineering
基金 "十二五"国家密码发展基金密码理论课题(MMJJ201101025)
关键词 可信计算 可信网络接入 TCM 隐私 平台证明 trusted computing trusted network access TCM privacy platform attestation
  • 相关文献

参考文献8

  • 1Trusted Computing Group. Trusted platform module main specifi- eation.Vemion, l.2, Revision I03[S].2007.
  • 2GM/T0011—2012,可信计算可信密码支撑平台功能与接口规范.2013.
  • 3Home of cisco network admission control[EB/OL].[2015-O1-31]. http:/Iwww.eiseo.eom/en/US/docs/ios/12_3tl l 2_3t8/featurelguide/ gt_nae.html.
  • 4Home of Microsoft network access protection[EB/OL].[2015-01-25]. http://technet.microsoft.com/en-us/network/bb54587 9.aspx.
  • 5TCG trusted network connect, TNC architecture for interoperability [EB/OL].[2015 -01-15].http://www.trustedcomputinggroup.org/ specs/TNC/.Specification Version 1.3.
  • 6Homepage of TNC@FHH[EB/OL].[2015-O1-20].http://tnc.inform. fh-hannover.de.
  • 7BENTE I, HELDEN J. Towards trusted network access control[C]// Prec. the First Intema-tional Conference Future of Trust in Corn-puting 2008.[S.1.]:Springer,2008:157 - 167.
  • 8FENG W, QIN Y, YU A M, et al. A DRTM-based method for trusted network eonnection[C]//Proc. International Conference on Trust, Security and Privacy in Computing and Communications . [S.I.]:IEEE Press,2011:425 - 435.

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部