메뉴 건너뛰기




Volumn 6163 LNCS, Issue , 2010, Pages 129-145

Privacy enhanced trusted network connect

Author keywords

Network Access Control; Policies; Privacy; Trusted Computing; Trusted Network Connect

Indexed keywords

COMPUTING SYSTEM; GENERIC MECHANISM; NETWORK ACCESS; NETWORK ACCESS CONTROL; NETWORK OPERATOR; POLICY APPROACH; TRUSTED COMPUTING; TRUSTED COMPUTING GROUPS; TRUSTED NETWORK;

EID: 77955047978     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14597-1_8     Document Type: Conference Paper
Times cited : (5)

References (22)
  • 7
    • 77955032400 scopus 로고    scopus 로고
    • June Specification Version 1.0 Revision 1
    • TCG Infrastructure Work Group. Reference Architecture for Interoperability (Part I) (June 2005), http://www.trustedcomputinggroup.org/ resources/infrastructure-work-group-reference-architecture-for- interoperability-specification-part-1-version-10 (Specification Version 1.0 Revision 1)
    • (2005) Reference Architecture for Interoperability , Issue.PART I
  • 8
    • 77955036728 scopus 로고    scopus 로고
    • November Specification Version 1.0 Revision 1
    • TCG Infrastructure Work Group. Reference Architecture Part II - Integrity Management (November 2006), http://www.trustedcomputinggroup.org/ resources/infrastructure-work-group-architecture-part-ii-integrity- management-version-10 (Specification Version 1.0 Revision 1)
    • (2006) Reference Architecture Part II - Integrity Management
  • 9
    • 77955032910 scopus 로고    scopus 로고
    • April Specification Version 1.3 Revision 6
    • TCG Trusted Network Connect Work Group. TNC Architecture for Interoperability (April 2008), http://www.trustedcomputinggroup.org/resources/ tnc- architecture-for-interoperability-version-13 (Specification Version 1.3 Revision 6)
    • (2008) TNC Architecture for Interoperability
  • 10
    • 77955014939 scopus 로고    scopus 로고
    • February to appear, Specification Version 1.0 Revision 30 Public Review
    • TCG Trusted Network Connect Work Group. TNC IF-M: TLV Binding (February 2008) (to appear), http://www.trustedcomputinggroup.org/developers/ trusted-network-connect (Specification Version 1.0 Revision 30 Public Review)
    • (2008) TNC IF-M: TLV Binding
  • 11
    • 36849090141 scopus 로고    scopus 로고
    • October Specification Version 1.2 Level 2 Revision 103
    • TCG Trusted Platform Module Work Group. TPM Main Part 2 TPM Structures (October 2006), http://www.trustedcomputinggroup.org/resources/tpm- specification-version-12-revision-103-part-1-3 (Specification Version 1.2 Level 2 Revision 103)
    • (2006) TPM Main Part 2 TPM Structures
  • 12
    • 78650021796 scopus 로고    scopus 로고
    • October Specification Version 1.2 Level 2 Revision 103
    • TCG Trusted Platform Module Work Group. TPM Main Part 3 Commands (October 2006), http://www.trustedcomputinggroup.org/resources/ tpm-specification- version-12-revision-103-part-1-3 (Specification Version 1.2 Level 2 Revision 103)
    • (2006) TPM Main Part 3 Commands
  • 13
    • 70749096362 scopus 로고    scopus 로고
    • July Specification Version 1.2 Level 2 Revision 103
    • TCG Trusted Platform Module Work Group. TPM Main Part 1 Design Principles (July 2007), http://www.trustedcomputinggroup.org/resources/tpm- specification-version-12-revision-103-part-1-3 (Specification Version 1.2 Level 2 Revision 103)
    • (2007) TPM Main Part 1 Design Principles
  • 14
    • 77955025991 scopus 로고    scopus 로고
    • Trust@FHH Research Group. TNC@FHH Project Page, http://trust.inform.fh- hannover.de/
    • TNC@FHH Project Page
  • 17
    • 33745883651 scopus 로고    scopus 로고
    • February Version 2.0
    • OASIS. eXtensible Access Control Markup Language (XACML) (February 2005), http://docs.oasis-open.org/xacml/2.0/access-control-xacml-2. 0-core-spec-os.pdf (Version 2.0)
    • (2005) eXtensible Access Control Markup Language (XACML)
  • 19
    • 77955048871 scopus 로고    scopus 로고
    • Towards real interoperable, real trusted network access control
    • Vieweg + Teubner
    • von Helden, J., Bente, I.: Towards real interoperable, real trusted network access control. In: ISSE 2008 Securing Electronic Business Processes, pp. 152-162. Vieweg + Teubner (2009)
    • (2009) ISSE 2008 Securing Electronic Business Processes , pp. 152-162
    • Von Helden, J.1    Bente, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.