期刊文献+

基于可信平台的保护终端敏感信息的隔离交换方案研究

The Research of the Isolation Exchange Scheme Based on Trusted Platform for Protecting Terminal Sensitive Information
下载PDF
导出
摘要 本文提出了基于可信平台的保护终端敏感信息的隔离交换方案,比传统的隔离装置在防护性能上有所提升,而且在隔离交换方式上也有所改进。通过采用可信计算技术,从物理层面提高了隔离交换装置的安全性以及完整性,通过使用改进的IPSec协议以及身份与位置分离等新技术,实现了内外网之间敏感数据的隔离交换。 In this paper we present an isolation exchange scheme based on trusted platform for protecting terminal sensitive information,which is better than traditional isolation equipment in protection quality and has some changes and improvements in the way of isolation exchange. We enhance security and integrity of the isolation exchange equipment from physical layer by utilizing trusted computing technology. We also realize isolation exchange of sensitive information between internal network and external network by exploiting some new technologies such as enhanced IPSec protocol and separation between identity and location.
出处 《北京电子科技学院学报》 2014年第4期43-47,共5页 Journal of Beijing Electronic Science And Technology Institute
关键词 隔离交换 可信计算 IPSEC Isolation exchange trusted computing IPSec
  • 相关文献

参考文献8

  • 1Trusted Computing Group. Trusted Platform Module Specifications [ EB/OL ]. http://www. trustedcomputinggroup, org/developers/trusted _ platform_module/specifications.
  • 2国家密码管理局.可信计算密码支撑平台功能与接口规范[EB/OL].http://www.oscca.gov.cn/,2007-12-29.
  • 3United States. National Security Agency. High As- surance Internet Protocol Encryptor Interoperability Specification. Version 3.1.0. De- cember 31, 2006.
  • 4Mirhakkak, M., Ta, P., Fineberge, V., and Comparetto, G., Modeling and Simulation of HAIPE,MILCOM 2006 Conference, 23-25 Oc-tober 2006.
  • 5Glen Nakamoto, Lisa Higgins, Justin Richer. Scal- able HAIPE Discovery Using a DNS- Like Refferal Model. MITRE Corporation.USA,2005.
  • 6Committee on National Security System, National Policy Governing the Use of High Assurance Inter- net Protocol Encryptor (HAIPE) Products, CNSS Policy No. 19 February 2007.
  • 7郑炜,须文波.物理隔离网闸的设计与实现[J].微计算机信息,2005,21(12Z):131-134. 被引量:15
  • 8王凤领.基于IPSec的VPN技术的应用研究[J].计算机技术与发展,2012,22(9):250-252. 被引量:27

二级参考文献14

  • 1马强,李燕军.网络安全之GAP技术研究[J].网络安全技术与应用,2004(11):36-38. 被引量:5
  • 2万国平.网络隔离与网闸[M].北京:机械工业出版社,2004..
  • 3Kevin Gennuso,Disconnect from the Internet - Whale' s e-Gap Indepth.SANS Reading Room.[EB/OL].https://www.sans.org/rr/whitepapers/firewalls/802.php 2005.4.10.
  • 4Kent S,Atkinson R. IP Authentication Header[ S]. RFC2402 IETF,1998.
  • 5Kent S, Atkinson R. IP Encapsulating Security Payload[ S]. RFC2406 IETF, 1998.
  • 6Kent S,Atkinson R. The Internet Key Exchange[ S]. RFC2409 IETF,1998.
  • 7Maughan D,Schertler M,Schneider M. Internet Security Association and key Management Protocel (ISAKMP) [ S]. RFC 2408,IETF, 1998.
  • 8颜凯,杨宁,李育强,等.思科网络技术学院教程CCNP 2远程接人[M].北京:人民邮电出版社,2004.
  • 9蓝集明,陈林.对IPSec中AH和ESP协议的分析与建议[J].计算机技术与发展,2009,19(11):15-17. 被引量:6
  • 10梁军,聂瑞华.基于IPSec的VPN技术的研究[J].计算机与现代化,2009(11):57-59. 被引量:5

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部