Research on Gateway Security Isolation Technology Based on Trusted Computing

Article Preview

Abstract:

This paper analyzes the lack of the existing network security isolation technology in internal information network, for these deficiencies, designed new gateway security isolation scheme. Based on analyzing the computing trust mechanism and the gateway security isolation system security requirements, using the fifth generation of network isolation technology, identification authentication technology, tags technology and other technologies, proposed a new network security isolation programs based on trusted computing technology, designed gateway security isolation system and trusted computing information protection model, studied network access control mechanism based on the model. The program is simple and flexible and more secure than traditional security isolation scheme.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1656-1659

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Puyang Yu, Guosheng Kang. Research and Development of Trusted Computing [J]. COMPUTER TECHNOLOGY AND DEVELOPMENT, 2011, 21 (8): 235.

Google Scholar

[2] Shengzhao Huang, Zhao Hui, Zhonggui Bao. Study and Research on Technologies of Network Isolation [J]. Communications Technology, 2010, 43 (5) : 100-101.

Google Scholar

[3] Zhou Xin, Lujing Tao. Trusted Computing and Its Application in Information Systems [J]. Command Information System and Technology, 2012, 2 (2) : 29-30.

Google Scholar

[4] Shengzhao Huang, Zhao Hui, Zhonggui Bao. New Method of Internet Security Isolation Technology of Military Integrated Information System [J]. Journal of Spacecraft TT & C Technology, 2010, 29 (5) : 96-97.

Google Scholar

[5] Daqing Pang, Aike Zhang, Cuilan Xie. Realization Proposal and Security Model of Operating System Based on Credible Computation [J]. JOURNAL OF LIUZHOU VOCATIONAL & TECHNICAL COLLEGE, 2011, 11 (4) : 52-53.

Google Scholar

[6] Yang Bei, Zhenqiang Wu, Xiaobo Yang. Multi-level security model based on trusted computing Computer Engineering and Applications [J]. Computer Engineering and Applications, 2011, 47 (27) : 122-123.

Google Scholar

[7] Jingjing Sun, Cai Mian, Zhao Yang. Based on Trusted Computing User Security Model for Cloud Computing [J]. Computer security, 2012, (4) : 19-20.

Google Scholar

[8] Yanwei Zhou, Zhenqiang Wu, Zirui Qiao. Things Information Transport Protocol for IOT Based on Trusted Computing [J]. Computer Engineering, 2010, 36 (17) : 81-82.

Google Scholar