[PDF][PDF] Securing internet of vehicles using TCM

J Wang, Y Liu, W Gao - … Journal of Digital Content Technology and …, 2010 - researchgate.net
In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as
identity authentication and integrality verification, we apply the trusted cryptography module …

Research on hiberarchy trusted network based on the grade division

J Wang, Y Liu, J Zhang, J Zhu… - 2008 3rd International …, 2008 - ieeexplore.ieee.org
A framework of hiberarchy trusted network based on the grade division was put forward, and
the partition rules of trusted attributes as well as the methods of grade division were …

[PDF][PDF] The Equivalent Queuing Model by a Partition Algorithm for Tree Connected Servers

CP CHEN, YWEN BAI, HH PENG, YYU CHEN - wseas.com
This paper aims at analysis efficiency in estimating the performance of tree connected
servers. We use a queuing model to represent their equivalent performance and service …

Novel access and remediation scheme in hierarchical trusted network

J Wang, Y Liu, Y Jiao - Computer communications, 2011 - Elsevier
Trusted computing technology is expected to guarantee security for network and terminal in
future communication environment. In this work, we introduce the concept of trusted attribute …

Evaluating Access Terminal in Trusted Network

J Wang, Y Liu, J Zhang, Y Jiao - 2009 IEEE Circuits and …, 2009 - ieeexplore.ieee.org
Recently trusted network becomes hot topic in network security domain. By introducing the
concept of" trusted attribute", we proposed grade division scheme, which was called …

[PDF][PDF] FIT-LDAP: Um Serviço de Diretório Tolerante a Falhas e Intrusões

Directory services (eg, LDAP) are often used to keep sensitive information (eg, data and
user credentials) for critical systems such as domain control servers, DNS servers, access …

Study on Grade Division Policy for Trusted Network

D Long - Procedia Environmental Sciences, 2012 - Elsevier
Scholars around the world have carried out extensive research word on architecture,
protocols, algorithms and application for trusted network at present, and proposed a variety …

Trusted Network Connection Based on Object Fingerprints

X Kun, J Xing, G Yong - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Traditional technology of network access controlling passive defense attacking by external
hack, and cannot eliminate menace to network by some malicious network terminal. To …

[引用][C] LDAP 在数字校园统一身份认证系统中的应用

贺玉明, 李晋宏, 唐辉 - 计算机技术与发展, 2011

[引用][C] 一种新的可信修复网络模型及其实现

王健, 刘衍珩, 张瀛戈, 梅芳 - 解放军理工大学学报: 自然科学版, 2008