Xiaochen Liu, Gongxuan Zhang, Bin Song, Jingwei Wan
{"title":"Research on Trusted Platform Network Access Control Technology","authors":"Xiaochen Liu, Gongxuan Zhang, Bin Song, Jingwei Wan","doi":"10.1109/ITAPP.2010.5566188","DOIUrl":null,"url":null,"abstract":"This paper presents four kinds of security attribute to assess the PC terminal whether it is safe and reliable. The terminal will be measured by its credibility before accessed to network, and then assigned to different levels of security network environments basis on the value of credibility. By using self-designed trusted hardware platform - ENSS (Embedded Network Security System) PCI card, programming network driver and tailoring the architecture of TNC (Trusted Network Connection), this paper achieved network security accessing and access control policies to construct trusted network environment.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"58 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Internet Technology and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITAPP.2010.5566188","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents four kinds of security attribute to assess the PC terminal whether it is safe and reliable. The terminal will be measured by its credibility before accessed to network, and then assigned to different levels of security network environments basis on the value of credibility. By using self-designed trusted hardware platform - ENSS (Embedded Network Security System) PCI card, programming network driver and tailoring the architecture of TNC (Trusted Network Connection), this paper achieved network security accessing and access control policies to construct trusted network environment.