Network Access Control Technology Based on Trusted Label

Article Preview

Abstract:

This research proposes network access control model based on the trusted label. The model combines the admission access control of network device and the transmission access control of data flow effective, and uses the trusted computing technology to ensure the credibility of the generated label, and adopts the access control based on the security domain to locate the granularity of access control to every packets, reduces the probability of successful attack to the network based on the information flow, thereby improving the security control of the network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

465-468

Citation:

Online since:

June 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Lu Yu, Wang Yu. Information network security control[M]. beijing: Defense Industry Press. (2010).

Google Scholar

[2] Cisco. Cisco Network Admission Control[EB/OL]. [Z]. (2010).

Google Scholar

[3] Microsoft Corporation. Introduction to Network Access Protection[EB/OL][Z]. (2004).

Google Scholar

[4] TCG. TCG TNC Architecture Version 1. 0[S]. (2006).

Google Scholar

[5] TCG. TCG trusted network connect TNC architecture for interoperability version 1. 1 [S]. (2006).

Google Scholar

[6] Liu Wei Wei, Han Zhen, Sheng Chang Xiang. Trusted network connect control based on terminal behavior [J]. Communications2009, 30(11): 127-134.

Google Scholar