Research of Trusted Network Security Technology

被引:1
|
作者
Gan, XiaoYing [1 ,2 ]
Liu, Bin [2 ]
机构
[1] Xian Railway Bocat & Tech Inst, Dept Elect & Informat, Xian, Shaanxi, Peoples R China
[2] Shaanxi Univ Sci & Technol, Coll Elect & Informat Engn, Xian, Shaanxi, Peoples R China
来源
关键词
trusted network; trusted network connection; trusted remediation; trusted computing;
D O I
10.4028/www.scientific.net/AMM.52-54.713
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the requirements of integrity verification solution for end users. Put forward a credible fix the overall network design, reliable model restoration and repair services, network workflow. The system is in need of restoration to provide safe and reliable repair end-user data transmission, providing a humane, reasonable repair services to ensure the credibility of fixed network and the isolation effect of the terminal to be repaired and strengthened the security of fixed server. Realized the classification of various types of repair resources management, restoration of resources in ensuring the transfer of fast, reliable, based on the performance with a certain extension.
引用
收藏
页码:713 / +
页数:2
相关论文
共 50 条
  • [31] The Research of Network Database Security Technology Based on WebService
    Meng, Fanxing
    Wen, Xiumei
    Gao, Liting
    Pang, Hui
    Wang, Qinglin
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [32] Research on Computer Network Security Technology Based on the BP Neural Network
    He, Xiaochun
    Kan, Ping
    2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 581 - 584
  • [33] The Mobile Agent security enhanced by trusted computing technology
    Wu, Xiaoping
    Shen, Zhidong
    Zhang, Huanguo
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1234 - 1237
  • [34] A Security Framework for Mobile Network based on Security Services and Trusted Terminals
    Xue Ming-fu
    Hu Ai-qun
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [35] Research on Construction of Trusted Campus Network
    Guo, Ping
    Zhang, Hong
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [36] Research and Application of ARP Protocol Vulnerability Attack and Defense Technology Based on Trusted Network
    Xi, Huixing
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS I, 2017, 1820
  • [37] Web Application Security Based on Trusted Network Connection
    Fu, Yongwei
    Peng, Xinguang
    WEB INFORMATION SYSTEMS AND MINING, PT II, 2011, 6988 : 420 - 427
  • [38] Web application security based on trusted network connection
    College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan, Shanxi, China
    Lect. Notes Comput. Sci., PART 2 (420-427):
  • [39] Mitigating IoT Security Threats with a Trusted Network Element
    Kuusijarvi, Jarkko
    Savola, Reijo
    Savolainen, Pekka
    Evesti, Antti
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 260 - 265
  • [40] A novel trusted computing model for network security authentication
    Xing, Ling
    Jiang, Ling
    Yang, Guohai
    Wen, Bin
    Journal of Networks, 2014, 9 (02) : 339 - 343