期刊文献+

基于可信证书的可信网络接入模型及实现 被引量:3

New access model and implementation of trusted network based on trusted certificate
在线阅读 下载PDF
导出
摘要 通过在可信网络连接TNC场景中设立第三方可信证书中心的方式,对不满足TNC体系结构的终端提出了一种新的访问模型,详细地说明了该模型的工作流程和通讯机制,并用仿真实验证明了该模型在解决该类终端接入可信网络连接的可行性。 We propose a new access model for the endpoints that do not meet the requirements in Trusted Network Connection(TNC)specifications.This is done by setting a trusted third-party certificate authority for the TNC specifications.We explain the working flow and communication mechanism in detail.Simulations demonstrate the feasibility of the proposed model used in the scenario in which this kind of endpoints pass the TNC network access authentication.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2010年第2期496-500,共5页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(60573128) 高等学校博士学科点专项科研基金项目(20060183043) 国际科技合作与交流专项(2008DFA12140) 吉林大学研究生'985工程'创新计划项目(20080235)
关键词 计算机系统结构 可信网络 可信接入 可信证书 computer system organization trusted network trusted access trusted certificate
  • 相关文献

参考文献7

  • 1Computer economics, 2007 Malware report: the economic impact of viruses, spyware, adware, botnets, and other malicious code[R/OL]. [2007-06- 15}. http://www. computereconomics. com/article. cfm9 id=1225.
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 3Seshadri A, Luk M, Perrig A, et al. Externally verifiable code execution[J]. Communications of the ACM, 2006,49(9) :45-49.
  • 4Seshadri A, Luk M, Shi E, et al. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems[C] // Proceedings of ACM Symposium on'Operating Systems Principles (SOSP), New York, USA, 2005.
  • 5Wei Guo-heng, Zhou Xue-guang, Zhang Huan-guo. A trusted computing model based on code authorization[C] // Proceedings of the 2008 International Symposiums on Information Processing, Washington DC, USA, 2008.
  • 6Giffin J, Christodorescu M, Kruger l. Strengthening software self-checksumming via self-modifying code[C]//Proeeedings of the 21st Annual Computer Security Applications Conference, Washington DC, USA,2005.
  • 7Aaraj N, Raghunathan A, Ravi S, et al. Energy and execution time analysis of a software-based trusted platform module[C]//Proceedings of the Conference on Design, Automation and Test in Europe, San Jose, CA, USA, 2007.

二级参考文献17

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16

共引文献251

同被引文献47

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1340
  • 2唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 3张仕斌,何大可,遠藤誉.基于模糊聚类的信任类型动态定义机制研究[J].计算机工程,2006,32(9):19-21. 被引量:18
  • 4张仕斌,何大可,遠藤誉.模糊自主信任建立策略的研究[J].电子与信息学报,2006,28(8):1492-1496. 被引量:6
  • 5陈贞翔 葛连升 王海洋 等.普适环境中基于信任的服务评价和选择模型.软件学报,2006,17(11):200-210.
  • 6张仕斌,陈麟,王一川.一种基于模糊推理的主观信任评价模型[J].仪器与仪表学报,2009,30(S1):658-660.
  • 7Blaze M, Feigenbaum J, Lacy J. Decentralized trust manage- ment//Proceedings of the Symposium on Security and Privacy. Oakland, 1996: 164-173.
  • 8Blaze M, Feigenbaum J, Keromytis A D. Keynote: Trust management for public-key infrastructures//Proceedings of the 1998 Security Protocols International Workshop, Cambridge, England, 1998:59-63.
  • 9Khambatti M, Dasgupta P, Ryu K D. A role-based trust model for Peer-to-Peer communities and dynamic coalitions// Proceedings of the 2nd IEEE International Inorrnation Assurance Workshop. New York, 2004:141 154.
  • 10Winsborough William H, Seamons Kent E, Jones Vicki E. Automated trust negotiation//Proeeedings of the DARPA Information Survivability Conference Exposition. Piscataway, 2000, 1:88-102.

引证文献3

二级引证文献133

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部