Abstract
The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.
Similar content being viewed by others
References
Vaughan-Nichols S J. How Trustworthy is Trusted Computing? [J.].Computer, 2003,36(3): 18–20.
Oppliger R, Rytz R. Does Trusted Computing Remedy Computer Security Problems? [J].Security & Privacy Magazine, IEEE, 2005,3(2): 16–19
Hardjono T. TCG Infrestructure Working Group Reference Architecture for Interperability (Part I) Specification Version 1. 0[DB/OL]. [2005-11-16].https://www.trustedcomputinggroup.org/specs/1IWG/IWG Architecture vl 0 rl. pdf.
Hardjono T. TCG Trusted Network Connect, TNC Architecture for Interoperability Specification Version 1. 0 [DB/OL/. [2005-05-03].https://www.trustedcomputinggroup. org/specs/IWG/IWG Architecture_vl_0_rl. pdf.
De Laat C, Gross G, Gommans L,et al. Generic AAA Architecture[DB/OL]. [2005-11-02].http://www.ietf.org/rfc/rfc2903.txt.
Brickell E, Camenisch J, Chen Liqun. Direct Anonymous Attestation [C].Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), October 2004, Washingtion DC, USA: ACM Press, 2004:132–145
Harkins D. Carrel D. The Internet Key Exchange (IKE). RFC2409[DB/OL.]. [2005-11-02].http://www.ietf.org/rfc/rfc2409.txt
Blake Wilson S, Nystrom M, Hopwood D,et al. Transport Layer Security (TLS) Extensions[DB/OL]. [2005-11-02].http://www.ietf.org/rfc/rfc3546.txt
IEEE802, Port-Based Network Access Control[S],IEEE Std 802. 1X-2001, June 2001.
Aboba B, Blunk L, Vollbrecht J,et al. PPP Extensible Authentication Protocol (EAP) [DB/OL]. [2005-11-02]. http://www.ietf.org/rfc/rfc3784.txt
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by Specialized Research Fund for the Doctoral Program of Higher Education of China (20050013011)
Biography: ZHANG Miac(1980-), male, Ph. D candidate, research direction: cryptology and network security.
Rights and permissions
About this article
Cite this article
Miao, Z., Guoai, X., Zhengming, H. et al. A trusted host's authentication access and control model faced on user action. Wuhan Univ. J. Nat. Sci. 11, 1429–1432 (2006). https://doi.org/10.1007/BF02831790
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831790