期刊文献+

一种基于EAP的可信网络接入机制 被引量:6

An EAP-Based Trusted Network Access Mechanism
原文传递
导出
摘要 入网终端的可信状态对整个网络的安全具有十分重要的影响,可信计算组织TCG的可信网络连接TNC正是为解决可信接入的问题提出,已成为一个研究热点。基于TNC体系和EAP协议设计了可信网络接入机制。该机制利用接入控制协议交换量化的终端可信度、身份等信息,并根据接入策略确定是否允许终端入网。通过对接入控制协议的健壮性分析,表明该机制能有效实现终端的入网控制,从源头保障网络安全。 The trusted state of endpoints accessible to networks has important effects on the security of the whole network. Trusted network connection proposed by Trusted Computing Group is properly for solving trusted access issues and become a hotspot for a study. A trusted network access mechanism based on TNC architecture and EAP protocol is designed. The mechanism, by using access control protocol, exchanges quantitative trustworthiness information of the endpoint, including the identity information, and then makes sure whether the endpoint could have access to the network in accordance with the access policy. The robustness of the access control protocol is analyzed, and the analysis indicates that the mechanism could realize access control of the endpoint effectively and guarantee the network security from the very origin.
出处 《通信技术》 2009年第12期109-111,114,共4页 Communications Technology
关键词 可信网络连接 可信度 接入控制协议 trusted network connect trustworthiness access control protocol
  • 相关文献

参考文献7

二级参考文献44

  • 1李志民.基于密钥的安全认证系统设计[J].中原工学院学报,2004,15(6):56-58. 被引量:6
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4向冬,王润孝,石乘齐,姜晓鹏.基于可信网络连接的数据采集系统访问控制模型[J].计算机应用研究,2006,23(12):157-158. 被引量:4
  • 5Trusted Computing Group. Trusted Platform Module Main Specification Partl: Design Principles; Part 2: TPM Structures; Part 3: Commands[S]. 2006. 3.29. Specification version 1, 2. https://www. trustedeomputinggroup, org,
  • 6Haldar V, Chandra D, Franz M. Semantic Remote Attestation-A virtual machine directed approach to Trusted Computing[J].The USENIX Association, 2004.
  • 7IBM. Integrity Measurement Architecture (IMA)[EB/OL]2004.http://domino, research, ibm. com/comm/research_people, nsf/pa ges/sailer, ima. html.
  • 8池亚平,刘平,方勇.可信计算中的密钥托管问题研究[C].中国计算机学会信息保密专业委员会论文集.2006,09.
  • 9Zhang Xin-Wen, Chen Song-Qing, Ravi Sandhu. Enhancing data authenticity and integrity in P2P systems. IEEE Internet Computing, 2005, 9(6): 42-49
  • 10Xu Gang, Borcea Cristian, Iftode Liviu. Trusted applicationcentfic Ad-Hoc networks//Proceedings of the MASS07. Pisa,Italy, 2007

共引文献36

同被引文献41

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部