A Trusted Host’s Authentication Access and Control Model Faced on User Action
A Trusted Host’s Authentication Access and Control Model Faced on User Action作者机构:Information Security Center Beijing University of Posts and Telecommunications/State Key Laboratory of Networking and Switching Technology Beijing 100876 China
出 版 物:《Wuhan University Journal of Natural Sciences》 (武汉大学学报(自然科学英文版))
年 卷 期:2006年第11卷第6期
页 面:1429-1432页
学科分类:08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)]
主 题:trusted computing trusted network connection host control host authentication
摘 要:The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.