The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on acc...The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.展开更多
On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in t...On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the fuewall-penetrated technology based on trusted host is analyzed under the fuewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.展开更多
基金Supported by Specialized Research Fund for theDoctoral Programof Higher Education of China (20050013011)
文摘The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.
文摘On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the fuewall-penetrated technology based on trusted host is analyzed under the fuewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.