• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Wang, Guan (Wang, Guan.) | Yan, Zhiwei (Yan, Zhiwei.) | Chen, Jianzhong (Chen, Jianzhong.)

Indexed by:

EI Scopus

Abstract:

Network security equipment plays an important role in preventing network security attacks. However, with the change of network environment and the upgrade of network attack means, the protection ability of the security software on the existing network security equipment will gradually decrease with time. For some large organizations or enterprises, their information security operations centers lack attention to software version control and software update processes for network security equipment, resulting in some security crises in the software update process. In this paper, we propose a method for software trusted update on network security equipment. This method can provide trusted identify authentication, secure data transmission and effective software version control. It enables the network security operations centers to more safely manage software update process on network security equipment. This method uses the functions of Trusted Cryptography Module to provide trusted execution environment. In this paper, we had introduced the process design, the prototype design and theoretical analysis to explain the feasibility and safety of this method. © Published under licence by IOP Publishing Ltd.

Keyword:

Computer crime Cryptography Machine learning Network security Process control Learning algorithms

Author Community:

  • [ 1 ] [Wang, Guan]Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 2 ] [Wang, Guan]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 3 ] [Yan, Zhiwei]Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 4 ] [Yan, Zhiwei]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 5 ] [Chen, Jianzhong]Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 6 ] [Chen, Jianzhong]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, Beijing; 100124, China

Reprint Author's Address:

  • [wang, guan]beijing key laboratory of trusted computing, beijing university of technology, beijing, beijing; 100124, china;;[wang, guan]faculty of information technology, beijing university of technology, beijing, beijing; 100124, china

Show more details

Related Keywords:

Source :

ISSN: 1757-8981

Year: 2019

Issue: 5

Volume: 569

Language: English

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 9

Online/Total:386/10629416
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.