DocumentCode :
2409457
Title :
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology
Author :
Wang, Zhenyu ; Li, Xiangdong ; Yao, Lining ; Feng, Qi ; Wang, Ruimin
Author_Institution :
Nat. Digital Switching Syst. Eng. & Technol. Res. Center, Zhengzhou
Volume :
2
fYear :
2008
fDate :
17-20 Dec. 2008
Firstpage :
89
Lastpage :
93
Abstract :
Trusted Computing Technology provides powerful support for the solution to security issues of embedded endpoints in network computing environment. In this paper a general framework of trusted access, which is for implementation on embedded trusted endpoints, is presented. The paper describes the authentication procedure of trusted access and its formal definition, and the design and implementation of the trusted access protocol. Finally, the paper presents an isolation and remediation mechanism based on embedded trusted access. The mechanism is based on 802.1X, VLAN and TNC, and can be used on both wire and wireless embedded endpoints.
Keywords :
access protocols; local area networks; message authentication; telecommunication security; embedded network endpoint isolation; embedded trusted network connection mechanism; network computing environment; network remediation mechanism; network security; trusted access authentication procedure; trusted access protocol; trusted computing technology; virtual LAN; Authentication; Communication system security; Computer networks; Computer security; IEC standards; ISO standards; Information security; Isolation technology; Protection; Telecommunication standards; Trusted computing; isolation and remediation mechanism; security policy; trusted access; trusted network connection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3492-3
Type :
conf
DOI :
10.1109/EUC.2008.52
Filename :
4755212
Link To Document :
بازگشت