Research of Trusted Network Security Technology

Abstract:

Article Preview

Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the requirements of integrity verification solution for end users. Put forward a credible fix the overall network design, reliable model restoration and repair services, network workflow. The system is in need of restoration to provide safe and reliable repair end-user data transmission, providing a humane, reasonable repair services to ensure the credibility of fixed network and the isolation effect of the terminal to be repaired and strengthened the security of fixed server. Realized the classification of various types of repair resources management, restoration of resources in ensuring the transfer of fast, reliable, based on the performance with a certain extension.

Info:

Periodical:

Edited by:

Zhou Mark

Pages:

713-716

DOI:

10.4028/www.scientific.net/AMM.52-54.713

Citation:

X. Y. Gan and B. Liu, "Research of Trusted Network Security Technology", Applied Mechanics and Materials, Vols. 52-54, pp. 713-716, 2011

Online since:

March 2011

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.