YU Yan-feng, LIU Yi, ZHANG Shu-jie, DUAN Li-juan. Private Trusted Network[J]. Journal of Beijing University of Technology, 2006, 32(11): 1032-1036.
    Citation: YU Yan-feng, LIU Yi, ZHANG Shu-jie, DUAN Li-juan. Private Trusted Network[J]. Journal of Beijing University of Technology, 2006, 32(11): 1032-1036.

    Private Trusted Network

    • In order to realize a trusted private network,firstly,trusted computing technologies are utilized. Then with the use of combined public key algorithm(CPK),the trust chain from trustworthy terminal can be led into private networks,and the USB Key technique is used to overcome the weakness of CPK.Finally, with the cryptogram management and security management as the center,a comprehensive secure defensive system is constructed,and a trusted network model is established to realize security,authenticity,controllability and reliability of private networks.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return