A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks
ICN '07 Proceedings of the Sixth International Conference on Networking
TNC-compatible NAC System implemented on Network Processor
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
Proceedings of the 2007 ACM workshop on Scalable trusted computing
A New Information Measurement Scheme Based on TPM for Trusted Network Access
CISW '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops
Trust-Based Fast Authentication for Multiowner Wireless Networks
IEEE Transactions on Mobile Computing
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
Electronic Notes in Theoretical Computer Science (ENTCS)
A trusted network model using the lightweight directory access protocol
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
Cognitive radio network architecture: part II -- trusted network layer structure
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Trusted Computing: Trusted Computing - closing that lingering doubt
Network Security
Hi-index | 0.24 |
Trusted computing technology is expected to guarantee security for network and terminal in future communication environment. In this work, we introduce the concept of trusted attribute to build a novel framework for hierarchical trusted access and feasible remediation. The categorization of trusted attribute is justified primarily in terms of the point in the boot cycle of a system at which the respective attributes are measured. The concept of trusted attribute is extended to the notion of a ''trusted grade'' that is granted by a new added module so-called trusted level division function. Also we give a reasonable example of dividing trusted grades. We discuss the promising applications of our presented framework and the access procedure of terminal. The simulations show that by the proposed framework, not only the security and reliability of network can be ensured, but also the flexibility of terminal to access network is improved. And that the presented framework can provide necessary supports for interoperability of different equipment manufacturers. It also can be concluded that the presented remediation framework is easy to be deployed, by which the convenient and reliable remediation services are able to be offered to those terminals without achieving the security standards of local network.