首页 | 本学科首页   官方微博 | 高级检索  
     

A Trusted Host's Authentication Access and Control Model Faced on User Action
引用本文:ZHANG Miao XU Guoai HU Zhengming YANG Yixian. A Trusted Host's Authentication Access and Control Model Faced on User Action[J]. 武汉大学学报:自然科学英文版, 2006, 11(6): 1429-1432. DOI: 10.1007/BF02831790
作者姓名:ZHANG Miao XU Guoai HU Zhengming YANG Yixian
作者单位:Information Security Center, Beijing University of Posts and Telecommunications/State Key Laboratory of Networking and Switching Technology, Beijing 100876, China
基金项目:Supported by Specialized Research Fund for the Doctoral Program of Higher Education of China (20050013011)
摘    要:The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

关 键 词:信任计算 网络连接 主机控制 主机认证 控制模型
文章编号:1007-1202(2006)06-1429-04
收稿时间:2006-06-19

A trusted host's authentication access and control model faced on user action
Zhang Miao,Xu Guoai,Hu Zhengming,Yang Yixian. A trusted host's authentication access and control model faced on user action[J]. Wuhan University Journal of Natural Sciences, 2006, 11(6): 1429-1432. DOI: 10.1007/BF02831790
Authors:Zhang Miao  Xu Guoai  Hu Zhengming  Yang Yixian
Affiliation:(1) Information Security Center, Beijing University of Posts and Telecommunications/State Key Laboratory of Networking and Switching Technology, 100876 Beijing, China
Abstract:The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization. Foundation item: Supported by Specialized Research Fund for the Doctoral Program of Higher Education of China (20050013011) Biography: ZHANG Miac(1980-), male, Ph. D candidate, research direction: cryptology and network security.
Keywords:trusted computing   trusted network connection   host control   host authentication
本文献已被 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号