Font Size: a A A

The Design And Implementation Of Trusted Server

Posted on:2012-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:F ZhuFull Text:PDF
GTID:2178330332498246Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the growing popularity of computer and internet, sensitive information and classified information is also faced with growing security threat. Computer viruses, Trojans, spyware and other forms of malicious code spread in computer network and destroy the computer network. Improper use of the computer users has leaded to these results, such as running unknown applications in the operating system, not timely updating antivirus software and so on. What is more, users deliberately leak sensitive information and classified information. Facing the frequent incidents of information disclosure, companies suffered great losses. Traditional antivirus software and firewall have been unable to prevent such events happing effectively.Considering most companies'computer system is client/server architecture, the concept of trusted servers is proposed in this paper, extend the functionality of the server. Expansion the servers from simple service and storage resources providers into a security checking function of the authenticator. In this paper, according to monitoring and auditing the operational status of clients by the trusted servers and encrypted transmission in the communication process has realized the basic trusted network; This paper has realized encryption storage area in the trusted server; By the way of computing resources providing by the client, storage resources providing by the trusted server, ensure the security of programs that running on the client and protect sensitive information and classified information.
Keywords/Search Tags:Transitive Trust, Trusted server, Information Security, Trusted Network
PDF Full Text Request
Related items