期刊文献+

增强的无线TNC证实模型及协议设计 被引量:5

Design of enhanced wireless trusted network accessing attestation model and its protocols
下载PDF
导出
摘要 可信计算技术为解决无线安全问题提供了一个新的思路,无线可信接入是无线网络安全领域的研究热点。目前的可信网络连接(TNC)架构并不能够很好适应无线接入环境。通过分析TNC架构的不足,提出一种增强的无线TNC证实模型并设计模型下的相关协议。通过分析,该模型有较高安全性和效率,具有一定的匿名性,适合于无线接入环境,同时能够兼容不含可信芯片的无线终端接入。 Trusted computing technology brings a new solution to the wireless security problems.Wireless trusted accessing is an important aspect of WLAN security domain.The trusted network connect architecture is not adapted to the wireless accessing environment.By analyzing the deficiencies of TNC architecture,an enhanced wireless TNC attestation model and its protocols are proposed.The model has higher security and efficiency.It also has some anonymity and is adapted to the wireless accessing environment by analysis.At the same time,it also allows the wireless terminal without TPM to access.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第7期121-124,共4页 Computer Engineering and Applications
基金 国家自然科学基金重点项目No.60633020 西安电子科技大学计算机网络与信息安全教育部重点实验室开放课题(No.2007CNIS-06)~~
关键词 可信网络连接 无线接入 证实模型 可信平台模块 Trusted Network Connect(TNC) wireless access attestation model Trusted Platform Module(TPM)
  • 相关文献

参考文献11

  • 1Trusted Computing Group.TPM main specification version 1.2[EB/ OL].(2003-10).https://www.Trustedcomputing group.org/. 被引量:1
  • 2Trusted Computing Group.TCG trusted network connect TNC architecture for interoperability[EB/OL].(2007-05)5).https://www.trustedcomputinggroup.org/. 被引量:1
  • 3Sailer R,Zhang X,.laeger T,et al.Design and implementation of a TCG-based integrity measurement architeeture[C]//The 13th Usenix Security Symposium, 2004. 被引量:1
  • 4Chen Lu,Zhang Huan-guo.A new information measurement scheme based on TPM for trusted network access[M].[S.l.]:IEEE Computer Society Press,2007 : 506-509. 被引量:1
  • 5ZHANG Miao XU Guoai HU Zhengming YANG Yixian.A Trusted Host’s Authentication Access and Control Model Faced on User Action[J].Wuhan University Journal of Natural Sciences,2006,11(6):1429-1432. 被引量:1
  • 6Brickell E, Camenisch J, Chen L.Direct anonymous attestation[C]// Proceedings of 11th ACM Conference on Computer and Communications Security.New York:ACM Press,2004. 被引量:1
  • 7Brickell E,Chen L,Li Jiang-tao.Simplified security notions of direct anonymous attestation and a concrete scheme from Ppairings, Report 2008/104[R].Cryptology ePrint Archive,2008. 被引量:1
  • 8林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 9Trusted Computing Group.TPM main part 1 design principles version 1.2[EB/OL]. (2007-07).https://www.Trustedcomputinggroup.org/. 被引量:1
  • 10南湘浩著..CPK标识认证[M].北京:国防工业出版社,2006:216.

二级参考文献27

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,. 被引量:4
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33 被引量:1
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65 被引量:1
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22 被引量:1
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998 被引量:1
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656 被引量:1
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743 被引量:1
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33 被引量:1
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16 被引量:1

共引文献252

同被引文献42

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部