%0 Journal Article
%T Application of trusted computing compliance in VPN
可信计算在VPN中的应用
%A LIU Hong-wei
%A WEI Guo-bin
%A
刘宏伟
%A 卫国斌
%J 计算机应用
%D 2006
%I
%X Virtual Private Network (VPN) was studied. VPN enables telecommunication, but it cannot authenticate the configuration of computers. If a computer used for VPN access was compromised, an attack could exploit it to gain unauthorized access and make endpoint insecure. When being connected to the corporate network, the computer becomes a distributor of the untrustworthy endpoint to other computers on the enterprise network. Trusted computing technology can be used to solve these problems.To guarantee the security and trustworthiness of the endpoints, network connection and communication,Trusted Platform Module (TPM) was used to bind keyed attestation to authenticate the integrity of VPN, and Trusted Network Connect (TNC) was used to authenticate the security of network connections.
%K Virtual Private Network (VPN)
%K trusted computing
%K Trusted Platform Module (TPN)
%K Trusted Network Connect (TNC)
虚拟专用网
%K 可信计算
%K 可信平台
%K 可信网络连接
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=831E194C147C78FAAFCC50BC7ADD1732&aid=3D8E25EED9F32442&yid=37904DC365DD7266&vid=96C778EE049EE47D&iid=59906B3B2830C2C5&sid=943AC17D52E75B65&eid=2CD0DCA22C808B7D&journal_id=1001-9081&journal_name=计算机应用&referenced_num=0&reference_num=5