Abstract
This paper introduces the security of Trusted Network Connection into Web applications. To solve the security of Web applications and the application limitations of Trusted Network Connection, which is only widely used in LAN and VPN, a new method used for Web application security is presented in the paper based on the thought of Trusted Network Connection. Through the model design and the system realization, it can prove that the thought of Trusted Network Connection can be applied to Web applications and improve the security of Web applications. At the mean time, the thought of Trusted Network Connection can reduce the attack of viruses and trojans and broaden the fields of Trusted Network Connection application.
Supported by the Natural Science Foundation of Shanxi Province under Grant No. 2009011022-2; supported by Shanxi Scholarship Council of China Grant No. 2009-28.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
TCG Trusted Network Connect TNC Architecture for Interoperability Specification Version 1.4 Revision 4, Published (May 18, 2009)
Liu, H., Wei, G.: Application of trusted computing compliance in VPN. Computer Applications 26(12), 2935–2937 (2006)
Garfinkel, S., Spanfford, G.: Web Security, Privacy & Commerce. China Machine Press, Beijing (2004)
IEEE802. Port-based network access control. IEEE Std 802.1X -2001 (June 2001)
TCG Trusted Network Connect TNC IF-PEP: Protocol Bindings for RADIUS Specification Version 1.1 Revision 0.75, Published (February 2007)
Christine, M.T.: Trusted Network Connect TNC Architecture for Interoperability Specification Version 1.2 Revision4 (EB/OL) (April 15, 2008) (December 19, 2008)
TCG Trusted Network Connect TNC IF-MAP Metadata for Network Security Specification Version 1.0 Revision 25, Published (September 13, 2010)
TCG Trusted Network Connect TNC IF-IMC Specification Version 1.2 Revision 8, Published (February 5, 2007)
TCG Trusted Network Connect TNC IF-IMV Specification Version 1.2 Revision 8, Published (February 5, 2007)
Leveson, N.G.: Safeware: System Safety and Computers – A Guide to Preventing Accidents and Losses Caused by Technology (1995)
TCG Trusted Network Connect TNC IF-TNCCS: TLV Binding Specification Version 2.0 Revision 16, Published (January 22, 2010)
Kaufman, C., Perlman, R., Speciner, M.: Network Security—Private Communication in a Public World. Publishing House of Electronics Industry, Bingjing (2004)
Garfinkel, S., Spanfford, G.: Web Security, Privacy & Commerce. China Machine Press, Beijing (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fu, Y., Peng, X. (2011). Web Application Security Based on Trusted Network Connection. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6988. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23982-3_51
Download citation
DOI: https://doi.org/10.1007/978-3-642-23982-3_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23981-6
Online ISBN: 978-3-642-23982-3
eBook Packages: Computer ScienceComputer Science (R0)