{"title":"Research on Remediation Model and Its Realization Based on Trusted Network","authors":"J. Zhang, Yanheng Liu, Jian Wang, Xiaomin Liu","doi":"10.1109/NSWCTC.2009.101","DOIUrl":null,"url":null,"abstract":"Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation services are able to be provided to those terminals without according with the security policy of local network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NSWCTC.2009.101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation services are able to be provided to those terminals without according with the security policy of local network.