2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing 2008
DOI: 10.1109/euc.2008.52
|View full text |Cite
|
Sign up to set email alerts
|

Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology

Abstract: Trusted Computing Technology provides powerful support for the solution to security issues of embedded endpoints in network computing environment. In this paper a general framework of trusted access, which is for implementation on embedded trusted endpoints, is presented. The paper describes the authentication procedure of trusted access and its formal definition, and the design and implementation of the trusted access protocol. Finally, the paper presents an isolation and remediation mechanism based on embedd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2010
2010
2010
2010

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 0 publications
0
0
0
Order By: Relevance