全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Application of trusted computing compliance in VPN
可信计算在VPN中的应用

Keywords: Virtual Private Network (VPN),trusted computing,Trusted Platform Module (TPN),Trusted Network Connect (TNC)
虚拟专用网
,可信计算,可信平台,可信网络连接

Full-Text   Cite this paper   Add to My Lib

Abstract:

Virtual Private Network (VPN) was studied. VPN enables telecommunication, but it cannot authenticate the configuration of computers. If a computer used for VPN access was compromised, an attack could exploit it to gain unauthorized access and make endpoint insecure. When being connected to the corporate network, the computer becomes a distributor of the untrustworthy endpoint to other computers on the enterprise network. Trusted computing technology can be used to solve these problems.To guarantee the security and trustworthiness of the endpoints, network connection and communication,Trusted Platform Module (TPM) was used to bind keyed attestation to authenticate the integrity of VPN, and Trusted Network Connect (TNC) was used to authenticate the security of network connections.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133