Advertisement

Wuhan University Journal of Natural Sciences

, Volume 11, Issue 6, pp 1429–1432 | Cite as

A trusted host's authentication access and control model faced on user action

  • Zhang Miao
  • Xu Guoai
  • Hu Zhengming
  • Yang Yixian
Trusted Architecture
  • 24 Downloads

Abstract

The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

Key words

trusted computing trusted network connection host control host authentication 

CLC number

TP 305 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Vaughan-Nichols S J. How Trustworthy is Trusted Computing? [J.].Computer, 2003,36(3): 18–20.CrossRefGoogle Scholar
  2. [2]
    Oppliger R, Rytz R. Does Trusted Computing Remedy Computer Security Problems? [J].Security & Privacy Magazine, IEEE, 2005,3(2): 16–19CrossRefGoogle Scholar
  3. [3]
    Hardjono T. TCG Infrestructure Working Group Reference Architecture for Interperability (Part I) Specification Version 1. 0[DB/OL]. [2005-11-16].https://www.trustedcomputinggroup.org/specs/1IWG/IWG Architecture vl 0 rl. pdf. Google Scholar
  4. [4]
    Hardjono T. TCG Trusted Network Connect, TNC Architecture for Interoperability Specification Version 1. 0 [DB/OL/. [2005-05-03].https://www.trustedcomputinggroup. org/specs/IWG/IWG Architecture_vl_0_rl. pdf. Google Scholar
  5. [5]
    De Laat C, Gross G, Gommans L,et al. Generic AAA Architecture[DB/OL]. [2005-11-02].http://www.ietf.org/rfc/rfc2903.txt.Google Scholar
  6. [6]
    Brickell E, Camenisch J, Chen Liqun. Direct Anonymous Attestation [C].Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), October 2004, Washingtion DC, USA: ACM Press, 2004:132–145Google Scholar
  7. [7]
    Harkins D. Carrel D. The Internet Key Exchange (IKE). RFC2409[DB/OL.]. [2005-11-02].http://www.ietf.org/rfc/rfc2409.txt Google Scholar
  8. [8]
    Blake Wilson S, Nystrom M, Hopwood D,et al. Transport Layer Security (TLS) Extensions[DB/OL]. [2005-11-02].http://www.ietf.org/rfc/rfc3546.txt Google Scholar
  9. [9]
    IEEE802, Port-Based Network Access Control[S],IEEE Std 802. 1X-2001, June 2001.Google Scholar
  10. [10]
    Aboba B, Blunk L, Vollbrecht J,et al. PPP Extensible Authentication Protocol (EAP) [DB/OL]. [2005-11-02]. http://www.ietf.org/rfc/rfc3784.txtGoogle Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  • Zhang Miao
    • 1
  • Xu Guoai
    • 1
  • Hu Zhengming
    • 1
  • Yang Yixian
    • 1
  1. 1.Information Security CenterBeijing University of Posts and Telecommunications/State Key Laboratory of Networking and Switching TechnologyBeijingChina

Personalised recommendations