Research of Trusted Network Security Technology

被引:1
|
作者
Gan, XiaoYing [1 ,2 ]
Liu, Bin [2 ]
机构
[1] Xian Railway Bocat & Tech Inst, Dept Elect & Informat, Xian, Shaanxi, Peoples R China
[2] Shaanxi Univ Sci & Technol, Coll Elect & Informat Engn, Xian, Shaanxi, Peoples R China
来源
关键词
trusted network; trusted network connection; trusted remediation; trusted computing;
D O I
10.4028/www.scientific.net/AMM.52-54.713
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the requirements of integrity verification solution for end users. Put forward a credible fix the overall network design, reliable model restoration and repair services, network workflow. The system is in need of restoration to provide safe and reliable repair end-user data transmission, providing a humane, reasonable repair services to ensure the credibility of fixed network and the isolation effect of the terminal to be repaired and strengthened the security of fixed server. Realized the classification of various types of repair resources management, restoration of resources in ensuring the transfer of fast, reliable, based on the performance with a certain extension.
引用
收藏
页码:713 / +
页数:2
相关论文
共 50 条
  • [1] RESEARCH ON TRUSTED AND SECURITY FRAMEWORK OF HETEROGENEOUS NETWORK
    Zhang, Lin
    Zhang, Tongxu
    Du, Xuetao
    Wu, Xingyao
    Liu, Jia
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 212 - 215
  • [2] Research and application of network trusted interconnection technology
    Xie, Wenjia
    Wang, Zhe
    Tang, Ping
    Zhang, Zhongmin
    Chen, Longsheng
    Journal of Physics: Conference Series, 2021, 2079 (01):
  • [3] Research on Gateway Security Isolation Technology based on Trusted Computing
    Mao, Jiangkun
    Xu, Yufeng
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1656 - 1659
  • [4] Research on Node Trusted Degree Based Security Routing Technology
    Liang, Hongquan
    Wu, Wei
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 323 - 326
  • [5] Research on the Network Technology Security
    Rong, Wang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1739 - 1741
  • [6] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing
    Li, Ming
    Fang, Yuan
    Liu, Jun
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
  • [7] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [8] Research on Wireless Network Security Technology
    Yang, Wen-jing
    Li, Zhi-yuan
    Zhou, Huai-jun
    Li, Ran
    Zhao, Hai-yan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 296 - 299
  • [9] Research of Computer Network Security Technology
    Tan, Juan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 736 - 740
  • [10] Security Model Research Based on Trusted Computing in Ad Hoc Network
    Lin Zhuying
    Liu Xiaojie
    Lu Lin
    Shi Lei
    Xie Gang
    CHINA COMMUNICATIONS, 2011, 8 (04) : 1 - 10