Abstract

This paper analyzes the lack of the existing network security isolation technology in internal information network, for these deficiencies, designed new gateway security isolation scheme. Based on analyzing the computing trust mechanism and the gateway security isolation system security requirements, using the fifth generation of network isolation technology, identification authentication technology, tags technology and other technologies, proposed a new network security isolation programs based on trusted computing technology, designed gateway security isolation system and trusted computing information protection model, studied network access control mechanism based on the model. The program is simple and flexible and more secure than traditional security isolation scheme.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.