Paper Title:
Research of Trusted Network Security Technology
  Abstract

Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the requirements of integrity verification solution for end users. Put forward a credible fix the overall network design, reliable model restoration and repair services, network workflow. The system is in need of restoration to provide safe and reliable repair end-user data transmission, providing a humane, reasonable repair services to ensure the credibility of fixed network and the isolation effect of the terminal to be repaired and strengthened the security of fixed server. Realized the classification of various types of repair resources management, restoration of resources in ensuring the transfer of fast, reliable, based on the performance with a certain extension.

  Info
Periodical
Edited by
Zhou Mark
Pages
713-716
DOI
10.4028/www.scientific.net/AMM.52-54.713
Citation
X. Y. Gan, B. Liu, "Research of Trusted Network Security Technology", Applied Mechanics and Materials, Vols. 52-54, pp. 713-716, 2011
Online since
March 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Qiong Long, Zhi Fang Huang, Jin Fan Zhang
Chapter 3: Advanced Digital Enterprise
Abstract:Intelligent transportation integrated access system can significantly improve the security of computer network systems, while trusted...
370
Authors: Song Deng, Wei Min Lin, Tao Zhang, Yuan Yuan Ma
Chapter 19: Software Development and Mathematical Modeling
Abstract:With the development of interactive business for smart grid, for the security access requirement of kinds of business terminal, this paper...
2659
Authors: Ya Qin Fan, Ge Zhang, Fei Fei Li, Xin Zhang
Chapter 3: Information Technologies, WEB and Networks Engineering, Information Security, E-Engineering, Software Application and Development
Abstract:Abstract: in order to solve the access control system loopholes, can appear the problem of chaotic management, security failure and conflict...
1299
Authors: Jie Shan, Cui Yuan Yu
Chapter 4: Mathematical Analysis, Computer Science, Communication and Information Technologies
Abstract:With the development and application of campus network technology in vocational colleges,campus network security has become a major issue for...
867