首页 | 本学科首页   官方微博 | 高级检索  
     

可信计算在VPN中的应用
引用本文:刘宏伟,卫国斌.可信计算在VPN中的应用[J].计算机应用,2006,26(12):2935-2937.
作者姓名:刘宏伟  卫国斌
作者单位:北京科技大学,信息工程学院,北京,100083
摘    要:对虚拟专用网VPN进行了研究。VPN使用户远程办公成为可能,但是VPN不能认证主机的配置,入侵者通过有VPN访问权限的主机获得非法的访问权限,使得终端不安全,同时相应的使网络接入也不安全。可以利用可信计算技术解决这些问题,其中可信平台模块通过绑定密钥认证VPN完整性,而可信网络连接认证网络连接安全性,以确保终端、网络接入和通信的安全可信。

关 键 词:虚拟专用网  可信计算  可信平台  可信网络连接
文章编号:1001-9081(2006)12-2935-03
收稿时间:2006-06-20
修稿时间:2006-06-202006-08-25

Application of trusted computing compliance in VPN
LIU Hong-wei,WEI Guo-bin.Application of trusted computing compliance in VPN[J].journal of Computer Applications,2006,26(12):2935-2937.
Authors:LIU Hong-wei  WEI Guo-bin
Affiliation:School of Information Engineering, Beijing Science and Technology University, Beijing 100083, China
Abstract:Virtual Private Network (VPN) was studied. VPN enables telecommunication, but it cannot authenticate the configuration of computers. If a computer used for VPN access was compromised, an attack could exploit it to gain unauthorized access and make endpoint insecure. When being connected to the corporate network, the computer becomes a distributor of the untrustworthy endpoint to other computers on the enterprise network. Trusted computing technology can be used to solve these problems.To guarantee the security and trustworthiness of the endpoints, network connection and communication,Trusted Platform Module (TPM) was used to bind keyed attestation to authenticate the integrity of VPN, and Trusted Network Connect (TNC) was used to authenticate the security of network connections.
Keywords:Virtual Private Network (VPN)  trusted computing  Trusted Platform Module (TPN)  Trusted Network Connect (TNC)
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号