Research of Trusted Network Security Technology

Article Preview

Abstract:

Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the requirements of integrity verification solution for end users. Put forward a credible fix the overall network design, reliable model restoration and repair services, network workflow. The system is in need of restoration to provide safe and reliable repair end-user data transmission, providing a humane, reasonable repair services to ensure the credibility of fixed network and the isolation effect of the terminal to be repaired and strengthened the security of fixed server. Realized the classification of various types of repair resources management, restoration of resources in ensuring the transfer of fast, reliable, based on the performance with a certain extension.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

713-716

Citation:

Online since:

March 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Abdul-Rahman, A. Hailes, S. A distributed trust model[J]. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, (1998), pp.48-60.

DOI: 10.1145/283699.283739

Google Scholar

[2] Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network[C]. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security. Brighton: Springer-Verlag, (1994), pp.3-18.

DOI: 10.1007/3-540-58618-0_53

Google Scholar

[3] ZHANG X F, XU F, SHEN C X. Research on multilevel security model based on trustworthy state and its application[J]. Acta electronica sinica, 35(8), (2007), pp.1511-1515.

Google Scholar

[4] S. M. Bellovin, A look back at "security problems in the TCP/IP protocol suite", in Proceedings - Annual Computer Security Applications Conference, ACSAC, Tucson, AZ, United States, (2004), pp.229-249.

DOI: 10.1109/csac.2004.3

Google Scholar

[5] L. P. Gaspary, C. Melchiors, F. E. Locatelli, and F. Dillenburg, Identification of intrusion scenarios through classification, characterization and analysis of firewall events, in Proceedings - Conference on Local Computer Networks, LCN, Tampa, FL, United States, (2004).

DOI: 10.1109/lcn.2004.65

Google Scholar

[6] J. Roy, M. S. Bank, and C. Mazumdar, ESRML: A markup language for enterprise security requirement specification, in Proceedings of the IEEE INDICON 2004 - 1st India Annual Conference, Kharagpur, India, (2004), pp.509-512.

DOI: 10.1109/indico.2004.1497807

Google Scholar