Font Size: a A A

Trusted Network-based Access Control Model

Posted on:2010-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y ChengFull Text:PDF
GTID:2208360278979214Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the continuous development of wireless networks technologies and the gradual deepening of the Trusted Computing theoretical research, there is the demand for information to the network from the traditional Internet credibility to mobile network evolution. As a credible next-generation mobile networks, its security problems have become more prominent. Because of the mobile network heterogeneity, and resources and the environment is not controllable and uncertainties, and different degree of autonomy between the management of regional resource sharing and business collaboration, the traditional identity-based access control technology does not fit the mobile trusted network. The best way to solve the management of regional inter-business collaboration of different degree of autonomy is to design a suitable model for mobile trusted network. So it has the important theory meaning and realistic meaning to study the access control model of trusted network.The Trusted Network Connect (TNC) working group of the Trusted Computing Group (TCG) has created an open, standards-based architecture. By integrating the trusted hardware of the TPM into a network access control framework, the TCG combine conventional access control technology with trusted computing technology. The TNC architecture build a trusted network by checking that each endpoint attempting to access the network, and trustless access operation is controlled in the source. Trusted computing turns the past passive defense into the active defense based on terminal security.Trusted computing proposed provides a new solution to next network accessing security research.Based on Studying conventional access control technologies, analyzing characteristics of trusted networks and TNC requiring, there are three key contributions in this paper:(1)Designing and studying a region-based model. The model based on the basic idea of the TNC architecture model, and open environment of the characteristics of the management of regional self-government. Trusted network model through the fault-tolerant mechanisms, confidence-building mechanisms and consultative mechanism ensures the reliability of Mobile Trusted Network, maintainability and other security features.(2) The consultation mechanism of the trusted network model to do further study, puts forward a strategy for consultation TFlask support frame system to solve the mobile network operational collaboration between the entities when the strategy of co-ordination. TFlask support frame ensures the credibility of the mobile network architecture of the consistency and stability sexual.(3) TFlask consultations on the strategy to support the framework of the system of local security policy module to do further study, proposed access control model TUCON. TUCON model will be integrated into TNC architecture. In the model, we combine trusted computing theory with access control and assign the TUCON model. The main subject is divided into non-credible, the credibility and integrity of the credibility of the main subject of TUCON model. The formal description and analysis about the model has been done and the model has been proved correctness of the model.Finally thesis on Environment Trusted Network Access Control technology is summarized and prospects, and give further research directions and objectives.
Keywords/Search Tags:Trusted Platform Module, trusted network model, access control model, strategy consultations, Formal Verifications
PDF Full Text Request
Related items