2010
DOI: 10.1007/978-3-642-15476-8_16
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks

Abstract: Abstract. The approach described in this paper is part of the German national research project VOGUE. VOGUE leverages trusted network connect concepts as a key to implement/design a holistic and vendor neutral network access system while addressing shortcomings of traditional network access control mechanisms. The rest of the paper is organized as follows: Section 2 provides the motivation that outlines the importance of validating mobile devices state of health before allowing access to the enterprise network… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Securing a corporate network presents some similarities with the automotive context, e.g., when integrating mobile devices. Their approaches make use of strong authentication mechanisms and device integrity measurements in order to establish network connections and VPN tunnels [22]. However they usually lack specifications for a secure resource-and data-management.…”
Section: Related Workmentioning
confidence: 99%
“…Securing a corporate network presents some similarities with the automotive context, e.g., when integrating mobile devices. Their approaches make use of strong authentication mechanisms and device integrity measurements in order to establish network connections and VPN tunnels [22]. However they usually lack specifications for a secure resource-and data-management.…”
Section: Related Workmentioning
confidence: 99%
“…Corporate network security and automotive on-board security present several similarities, e.g., when integrating mobile devices. The corporate approaches rely mostly on strong authentication mechanisms and device integrity measurements in order to establish network connections or a VPN tunnel [13]. However they only regulate the network access and usually lack specifications for resources, data management and specifically information flows.…”
Section: Related Workmentioning
confidence: 99%
“…By proposing a new protocol stack, authors extended the application of TNC to the web environment. By analyzing and comparing the existing network control technology, integrating MTM (Mobile Trusted Module) as root-of-trust on smart phone, [7] extended the TNC to the mobile platform in order to resolve the security issues in mobile network. The proposed VOGUE architecture connected mobile platforms and management server by using the VPN gateway, and it granted the access control rights to the terminal depends on the comparing results of the integrity measurement results in mobile platform.…”
Section: Introductionmentioning
confidence: 99%