Research and Application of Network Trusted Interconnection Technology

نویسندگان

چکیده

Abstract In order to solve the problem of reliable information transmission between data centers and sources, sources centers, as well "network island" communication problem, a dynamic MPLS VPN method is proposed, principle steps are introduced, how apply supporting platform explained in detail.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of trusted network technology to industrial control networks

Interconnections between industrial control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest h...

متن کامل

Trusted Application Centric Ad Hoc Network

OF THE DISSERTATION Trusted Application Centric Ad hoc Network by Gang Xu Dissertation Director: Liviu Iftode The past few decades have witnessed rapid development of Mobile Ad hoc Networks (MANETs) technologies. However, in contrast to the huge potential and convenience enabled by MANETs, many people are still reluctant to allow their mobile computing devices to join MANETs and run MANET appli...

متن کامل

Applying Trusted Network Technology To Process Control Systems

Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hard...

متن کامل

Research on Data Leak Protection Technology Based on Trusted Platform

In order to guard against the leakage of important data in the system, a new model of data protection is proposed in the paper, which is also targeted at the shortcomings in the existing data protection technology in the field of data leakage prevention. By taking advantage of TPM data protection technique as well as the combination of symmetric encryption and asymmetric encryption, a new data ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of physics

سال: 2021

ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']

DOI: https://doi.org/10.1088/1742-6596/2079/1/012031