Study on Design and Implementation of Integrated Access System of Intelligent Transportation

Article Preview

Abstract:

Intelligent transportation integrated access system can significantly improve the security of computer network systems, while trusted computing technology can effectively enhance the credibility and safety of the terminal, and then construct a trusted network connection. Based on computing technology, this thesis proposes to establish a credible integrated access network, and implement network access control on the remote access equipment, thereby enhancing the safety of the integrated access system. The results show that, through the transmission technology of credible chain proposed in this paper, and remote proof technology basing on device identity and security policies can establish a credible integrated access system, thus effectively improving the security of Beijing intelligent transportation systems.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

370-374

Citation:

Online since:

July 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Changxiang. Building an Active and Comprehensive Information Security System. China information Security (in Chinese), 2007, 41(5).

Google Scholar

[2] Xiaoyong Li, Research on Key Technologies of The Credible Distributed Computing Environment, Beijing Jiaotong University Doctoral Dissertation, (2008).

Google Scholar

[3] Chiyong, The design and implementation of the trust chain under the Window environment. Beijing Jiaotong University Doctoral Dissertation, (2008).

Google Scholar

[4] CSC-STD-001-83, Department of Defense Standard, Department of Defense Trusted Computer System Evaluation Criteria (S). Dod Computer Security Center, Aug (2010).

Google Scholar

[5] Sean W. Smith. Outbound authentication for programmable secure coprocessors ©. In proceedings of the 7th European Symposium on Research in Computer Security, London, UK, 2009. Springer Verlag.

DOI: 10.1007/3-540-45853-0_5

Google Scholar