咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A Trusted Host’s Authenticatio... 收藏

A Trusted Host’s Authentication Access and Control Model Faced on User Action

A Trusted Host’s Authentication Access and Control Model Faced on User Action

作     者:ZHANG Miao XU Guoai HU Zhengming YANG Yixian 

作者机构:Information Security Center Beijing University of Posts and Telecommunications/State Key Laboratory of Networking and Switching Technology Beijing 100876 China 

出 版 物:《Wuhan University Journal of Natural Sciences》 (武汉大学学报(自然科学英文版))

年 卷 期:2006年第11卷第6期

页      面:1429-1432页

学科分类:08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Supported by Specialized Research Fund for theDoctoral Programof Higher Education of China (20050013011) 

主  题:trusted computing trusted network connection host control host authentication 

摘      要:The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分