Kun Wu

Work place: Department of Computer, Beijing University of Posts and Telecommunications, Beijing, China

E-mail: sherrywukun@163.com


Research Interests: Information Security, Network Security, Information-Theoretic Security


Kun Wu, born in 1980. Since 2009, she has been a Ph.D. candidate in computer science and technology from Department of Computer, Beijing University of Posts and Telecommunications, Beijing, China. Her current research interests include information security, trusted computing and access control. She achieved the master degree in Software Engineering from Jilin University, Changchun, China in 2005. Moreover, she has published three academic papers.

Author Articles
A Clientless Endpoint Authentication SchemeBased on TNC

By Kun Wu Zhongying Bai

DOI: https://doi.org/10.5815/ijitcs.2010.02.02, Pub. Date: 8 Dec. 2010

Trusted Network Connect (TNC) proposes a hierarchical and scalable architecture to securely and efficiently control endpoints` admission to the trusted computing platform to implement message passing and resource sharing. But, not all endpoints support or run a functional TNC client performing integrity checking, which represents a security risk in lots of environments. We have to consider the problem how to make these "clientless endpoints" access to trusted networks. It is of significance for improving the TNC mechanism. To solve the problem above, under the framework of TNC, this paper comes up with a clientless endpoint authentication scheme named CEAS. CEAS designs five enforcement mechanisms and the related message format to authenticate and authorize clientless endpoints. Furthermore, after the endpoints have connected to the networks, their initial determinations may be dynamically modified according to the updated circumstances. The experiment results prove that CEAS has the capability of effectively and flexibly making clientless endpoints access to trusted networks in a controlled and secure manner.

[...] Read more.
Other Articles