可信网络连接架构及关键技术研究  被引量:4

Key Technologies of Trusted Network Connection

在线阅读下载全文

作  者:周婕[1] 

机构地区:[1]海军计算技术研究所,北京100841

出  处:《计算机与数字工程》2016年第9期1774-1779,共6页Computer & Digital Engineering

摘  要:随着信息技术的深入发展,网络安全面临新的威胁和攻击。目前业内的网络安全解决方案大都侧重于先防外后防内,先防服务设施后防终端设施。而可信计算技术则反其道而行之,首先保证所有终端的可信性,通过可信组件来组建更大的可信系统,为用户提供更强的安全防护。论文在对可信计算技术进行深入分析的基础上引入可信网络连接概念,将传统的网络安全技术和可信计算技术相结合,构建了可信网络连接架构,分析了可信网络连接的关键技术,最后探讨了可信网络连接的应用领域。With the deeply development of information technology,we are confronted with new threats in the network security.In the network security field,most resolvents are leaned to providing methods of guarding against outside before inside,guarding against service establishment before terminal establishment.But trusted computing technology is reversed.Firstly,it guarantees the security and the creditability of all the terminals.Then,it constitutes more largely and believable system with trusted components so as to provide more powerful security measure.This paper first deeply analyzes the trusted computing technology.Then it introduces the concept of trusted network connection which combines traditional network security technology and trusted computing technology.It establishes a framework of trusted network connection and analyzes the key technologies.Lastly,it discusses the applied field of trusted network connection.

关 键 词:可信计算 可信网络连接 信任链 远程证明 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象