期刊文献+

可信网络连接安全协议与访问控制体系设计

Design of Trusted Network Connection Security Protocol and Access Control Architecture
下载PDF
导出
摘要 针对现阶段可信网络在连接与控制方面存在问题,分析现有可信网络实体功能、结构层次和接口协议,提出包含完整度量收集器在内的全新可信网络连接体系架构,重新设计以EAP-TNC数据包为核心的安全网络协议及访问控制体系。通过设置网络带宽、终端状态和可信等级等多项指标,对体系访问控制和连接性能进行实验测试。结论表明,可信网络连接安全协议和访问控制体系可使终端以安全可控的方式访问网络,具备良好的安全性和可用性。 In order to solve the connection and control problems of trusted network, the entity function, architecture and interface protocol of trusted network are analyzed,a new trusted network connection architecture,including the integrity measurement collector,is proposed,the security network protocol and access control architecture based on EAP-TNC data packet are designed.By setting specifi- cations such as network bandwidth, terminal state and reliability level, the performance of the basic connection and access control is test- ed.The result shows that based on the connection security protocol and access control architecture of trusted network, the terminal equipment can access the network in a secure and controllable way,and the security and availability are improved.
作者 王明书
出处 《无线电通信技术》 2016年第5期14-17,共4页 Radio Communications Technology
关键词 可信网络 连接体系 安全协议 访问控制 trusted network connection architecture security protocol access control
  • 相关文献

参考文献12

  • 1Robert D D.Optical Network Management and Control[J].Proceedings of the IEEE,2012,100(5):132-159.
  • 2Trusted Computing Group.TCG Trusted Network Connect TNC Architecture for Inter operability[EB/OL].http:∥www.trusted computinggroup.org,2012.
  • 3LIANG Zhi-gang,CHEN Yu-hai.The Design and Implementation of Single Sign-on based on Hybrid Architecture[J].Journal of Networks,2012(1):178-186.
  • 4Rexford J,Dovrolis C.Future Internet Architecture:Cleanslate Versus Evolutionary Research[J].Communications of the ACM,2010,53(9):19-23.
  • 5MA Jian-feng,MA Zhuo,WANG Chang-guang,et al.Architecture of Trusted Network Connect[J].Security Access in Wireless Local Area Networks,2009:411-433.
  • 6Martinez-Garcia A,Moreno-Conde A,Jodar-Sanchez F,et al.Sharing Clinical Decisions for Multimorbidity Case Management Using Social Network and Open-Source Tools[J].J Biomed Inform,2013,46(6):978-982.
  • 7Poritz J,Schunter M,Van H E,et al.Property AttestationScalable and Privacy-Friendly Security Assessment of Peer Computers[R].Technical Report RZ3548,2004.
  • 8Chen L,Landfermann R,Loehr H,et al.A Protocol for Property-Based Attestation.Proceedings of the First ACM Workshop On Scalable Trusted Computing[M].USA:ACM Press,2006:7-15.
  • 9Yu R W,Wang L N.Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains[J].Journal of Networks,2010,6(5):643-649.
  • 10Ulrich G,Benjamin J,Dennis L.Mutual Remote Attestation:Enabling System Cloning for TPM based Platforms[J].Security and Trust Management Lecture Notes in Computer Science,2012:193-203.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部