...
首页> 外文期刊>Network Computing >The Trusted Computing Dilemma
【24h】

The Trusted Computing Dilemma

机译:可信计算难题

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

When Dr. Frankenstein embarked on his fateful experiment, he had no clue he was creating a monster. Are the developers of trusted computing models building a monster of their own? The concept is this: Before a user logs on to a network, his Or her computer must check in to a third-party machine, controlled by the network administrator, to ensure that the machine meets policy requirements. If it does, the user is allowed access to the network. If it doesn't, the user's connection is funneled to a restricted VLAN, where the user can make changes, or have changes made automatically, to ensure policy confor-mance before being redirected to the "real" network.
机译:当科学怪人开始他的命运的实验时,他不知道他正在创造一个怪物。可信计算模型的开发人员是否在构建自己的怪物?概念是这样的:在用户登录网络之前,他或她的计算机必须签入由网络管理员控制的第三方计算机,以确保该计算机满足策略要求。如果是这样,则允许用户访问网络。如果没有,则用户的连接将进入受限的VLAN,用户可以在其中进行更改或自动进行更改,以确保策略一致性,然后再重定向到“真实”网络。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号