Skip to main content
Log in

A trusted host's authentication access and control model faced on user action

  • Trusted Architecture
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Vaughan-Nichols S J. How Trustworthy is Trusted Computing? [J.].Computer, 2003,36(3): 18–20.

    Article  Google Scholar 

  2. Oppliger R, Rytz R. Does Trusted Computing Remedy Computer Security Problems? [J].Security & Privacy Magazine, IEEE, 2005,3(2): 16–19

    Article  Google Scholar 

  3. Hardjono T. TCG Infrestructure Working Group Reference Architecture for Interperability (Part I) Specification Version 1. 0[DB/OL]. [2005-11-16].https://www.trustedcomputinggroup.org/specs/1IWG/IWG Architecture vl 0 rl. pdf.

  4. Hardjono T. TCG Trusted Network Connect, TNC Architecture for Interoperability Specification Version 1. 0 [DB/OL/. [2005-05-03].https://www.trustedcomputinggroup. org/specs/IWG/IWG Architecture_vl_0_rl. pdf.

  5. De Laat C, Gross G, Gommans L,et al. Generic AAA Architecture[DB/OL]. [2005-11-02].http://www.ietf.org/rfc/rfc2903.txt.

  6. Brickell E, Camenisch J, Chen Liqun. Direct Anonymous Attestation [C].Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), October 2004, Washingtion DC, USA: ACM Press, 2004:132–145

    Google Scholar 

  7. Harkins D. Carrel D. The Internet Key Exchange (IKE). RFC2409[DB/OL.]. [2005-11-02].http://www.ietf.org/rfc/rfc2409.txt

  8. Blake Wilson S, Nystrom M, Hopwood D,et al. Transport Layer Security (TLS) Extensions[DB/OL]. [2005-11-02].http://www.ietf.org/rfc/rfc3546.txt

  9. IEEE802, Port-Based Network Access Control[S],IEEE Std 802. 1X-2001, June 2001.

  10. Aboba B, Blunk L, Vollbrecht J,et al. PPP Extensible Authentication Protocol (EAP) [DB/OL]. [2005-11-02]. http://www.ietf.org/rfc/rfc3784.txt

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hu Zhengming.

Additional information

Foundation item: Supported by Specialized Research Fund for the Doctoral Program of Higher Education of China (20050013011)

Biography: ZHANG Miac(1980-), male, Ph. D candidate, research direction: cryptology and network security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Miao, Z., Guoai, X., Zhengming, H. et al. A trusted host's authentication access and control model faced on user action. Wuhan Univ. J. Nat. Sci. 11, 1429–1432 (2006). https://doi.org/10.1007/BF02831790

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831790

Key words

CLC number

Navigation