Research of Trusted Network Security Technology

被引:1
|
作者
Gan, XiaoYing [1 ,2 ]
Liu, Bin [2 ]
机构
[1] Xian Railway Bocat & Tech Inst, Dept Elect & Informat, Xian, Shaanxi, Peoples R China
[2] Shaanxi Univ Sci & Technol, Coll Elect & Informat Engn, Xian, Shaanxi, Peoples R China
来源
ADVANCES IN MECHANICAL ENGINEERING, PTS 1-3 | 2011年 / 52-54卷
关键词
trusted network; trusted network connection; trusted remediation; trusted computing;
D O I
10.4028/www.scientific.net/AMM.52-54.713
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the requirements of integrity verification solution for end users. Put forward a credible fix the overall network design, reliable model restoration and repair services, network workflow. The system is in need of restoration to provide safe and reliable repair end-user data transmission, providing a humane, reasonable repair services to ensure the credibility of fixed network and the isolation effect of the terminal to be repaired and strengthened the security of fixed server. Realized the classification of various types of repair resources management, restoration of resources in ensuring the transfer of fast, reliable, based on the performance with a certain extension.
引用
收藏
页码:713 / +
页数:2
相关论文
共 50 条
  • [21] The Research on Network Security Situation Awareness Technology
    Zhang, Yongmei
    Jia, Yanmei
    Zhong, Jinxiang
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1321 - 1326
  • [22] A Trusted Computing Technology for The Security of Mobile Agent
    Shen, Zhidong
    Wu, Xiaoping
    Honggen Xing
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 124 - 127
  • [23] RESEARCH ON NETWORK SECURITY SITUATION AWARENESS TECHNOLOGY BASED ON SECURITY INTELLIGENT MONITORING TECHNOLOGY
    Yang, Bingyu
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 1107 - 1116
  • [24] Research on Security Technology of Composite Reconfigurable Wireless Network
    Wu ShaoBo
    Li ChengShu
    2011 INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE (ICASS 2011), VOL V, 2011, : 277 - 281
  • [25] Research on Network Security Situation Assessment and Forecasting Technology
    Wang, Hongbin
    Zhao, Dongmei
    Li, Xixi
    JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 1239 - 1265
  • [26] Research for The Management and Technology of Library Network Information Security
    Feng, Cheng
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 544 - 547
  • [27] Research of security routing technology in wireless sensor network
    Wu, Jixiang
    Sensors and Transducers, 2013, 23 (SPEC.ISSUE): : 152 - 156
  • [28] Network Security-related Technology Research and Implementation
    Ruan, Jun
    Zhang, Pan
    Ding, Hongbi
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1720 - 1723
  • [29] Research on Security Management Technology of Computer Network Database
    Sun, Lixian
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 2081 - 2084
  • [30] Research of data mining technology in the construction of network security
    Wu, Yong
    INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS 1 & 2, 2014, : 671 - 677