Research and Application of Network Trusted Interconnection Technology
نویسندگان
چکیده
Abstract In order to solve the problem of reliable information transmission between data centers and sources, sources centers, as well "network island" communication problem, a dynamic MPLS VPN method is proposed, principle steps are introduced, how apply supporting platform explained in detail.
منابع مشابه
Application of trusted network technology to industrial control networks
Interconnections between industrial control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest h...
متن کاملTrusted Application Centric Ad Hoc Network
OF THE DISSERTATION Trusted Application Centric Ad hoc Network by Gang Xu Dissertation Director: Liviu Iftode The past few decades have witnessed rapid development of Mobile Ad hoc Networks (MANETs) technologies. However, in contrast to the huge potential and convenience enabled by MANETs, many people are still reluctant to allow their mobile computing devices to join MANETs and run MANET appli...
متن کاملeffect of postharvest application of chitosan and calcium chloride on decay and quality attributes of sweet cherry
چکیده ندارد.
15 صفحه اولApplying Trusted Network Technology To Process Control Systems
Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hard...
متن کاملResearch on Data Leak Protection Technology Based on Trusted Platform
In order to guard against the leakage of important data in the system, a new model of data protection is proposed in the paper, which is also targeted at the shortcomings in the existing data protection technology in the field of data leakage prevention. By taking advantage of TPM data protection technique as well as the combination of symmetric encryption and asymmetric encryption, a new data ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of physics
سال: 2021
ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']
DOI: https://doi.org/10.1088/1742-6596/2079/1/012031