Loading...
Please wait, while we are loading the content...
Similar Documents
Realization of Key Technology of Trusted Network Connect Based on IF-MAP Protocol
| Content Provider | Semantic Scholar |
|---|---|
| Author | Wang, Zelong Cai, Guoyang Liu, Wanzhen |
| Copyright Year | 2015 |
| Abstract | Network security has attracted increasing research interest in recent years. Through detailed investigations of the related structure of Trusted Network Connect (TNC), in this paper we research into the norms and key technology of Interface for Metadata Access Point (IF-MAP) protocol, as well as design and realize a prototype system of TNC based on the very protocol. The system includes trusted access module for endpoint computer and a security component that applies IF-MAP protocol. It realizes the sharing and interaction of security event information between firewall and Intrusion Detection System (IDS) and provides the capabilities of behavior determination for the endpoint computers and dynamic policy modification for firewalls. Keywords—Trusted Computing; Trusted Network Connect; Network Access Control; Metadata Access Point; Network Security |
| File Format | PDF HTM / HTML |
| DOI | 10.2991/iset-15.2015.38 |
| Alternate Webpage(s) | https://download.atlantis-press.com/article/16718.pdf |
| Alternate Webpage(s) | https://doi.org/10.2991/iset-15.2015.38 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |