首页 | 本学科首页   官方微博 | 高级检索  
     检索      

A Trusted Host's Authentication Access and Control Model Faced on User Action
作者姓名:ZHANG  Miao  XU  Guoai  HU  Zhengming  YANG  Yixian
作者单位:Information Security Center, Beijing University of Posts and Telecommunications/State Key Laboratory of Networking and Switching Technology, Beijing 100876, China
基金项目:Supported by Specialized Research Fund for the Doctoral Program of Higher Education of China (20050013011)
摘    要:The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

关 键 词:信任计算  网络连接  主机控制  主机认证  控制模型
文章编号:1007-1202(2006)06-1429-04
收稿时间:2006-06-19

A trusted host's authentication access and control model faced on user action
ZHANG Miao XU Guoai HU Zhengming YANG Yixian.A trusted host's authentication access and control model faced on user action[J].Wuhan University Journal of Natural Sciences,2006,11(6):1429-1432.
Authors:Zhang Miao  Xu Guoai  Hu Zhengming  Yang Yixian
Institution:(1) Information Security Center, Beijing University of Posts and Telecommunications/State Key Laboratory of Networking and Switching Technology, 100876 Beijing, China
Abstract:The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization. Foundation item: Supported by Specialized Research Fund for the Doctoral Program of Higher Education of China (20050013011) Biography: ZHANG Miac(1980-), male, Ph. D candidate, research direction: cryptology and network security.
Keywords:trusted computing  trusted network connection  host control  host authentication
本文献已被 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号