{"title":"可信网络体系结构与管理平台模型研究","authors":"Xiong-qing Peng, Zheng Wu, Yang Yu, Xia Zhang","doi":"10.1109/KAMW.2008.4810537","DOIUrl":null,"url":null,"abstract":"At present, isolated and single network security system can no longer meet the objective needs. As a new type of network, trusted network can make up many of the traditional network security flaws. Based on the analysis of the background and motivation of trusted network, the article discussed the concept and basic properties. It analyzed the architecture of trusted network and the functions of its composition. Finally, the article discussed one of models of the trusted network management platform and described its functions.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Study on the Architecture and Management Platform Model of Trusted Network\",\"authors\":\"Xiong-qing Peng, Zheng Wu, Yang Yu, Xia Zhang\",\"doi\":\"10.1109/KAMW.2008.4810537\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"At present, isolated and single network security system can no longer meet the objective needs. As a new type of network, trusted network can make up many of the traditional network security flaws. Based on the analysis of the background and motivation of trusted network, the article discussed the concept and basic properties. It analyzed the architecture of trusted network and the functions of its composition. Finally, the article discussed one of models of the trusted network management platform and described its functions.\",\"PeriodicalId\":375613,\"journal\":{\"name\":\"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/KAMW.2008.4810537\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KAMW.2008.4810537","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study on the Architecture and Management Platform Model of Trusted Network
At present, isolated and single network security system can no longer meet the objective needs. As a new type of network, trusted network can make up many of the traditional network security flaws. Based on the analysis of the background and motivation of trusted network, the article discussed the concept and basic properties. It analyzed the architecture of trusted network and the functions of its composition. Finally, the article discussed one of models of the trusted network management platform and described its functions.