Font Size: a A A

Research Of The Techniques Of Network Access Control In The VPN Environment

Posted on:2015-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:Z W WangFull Text:PDF
GTID:2272330431982387Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Electric power industry is the national economy development the most important basic industry, so the information of the power system is of great important for improving work efficiency and the way they work. With the rapid development of the Smart Grid and the constantly growing quality requirements in the information of the Smart Grid, more and more devices need to connect to the intranet. While meeting the convenience and efficiency of the system maintainers, ensuring the safety and integrity of data and monitoring the access devices, it grows the higher request to the security and control of the intranet.We design an effective access control schemes for the Smart Grid, it can provide the users the trusted network architecture. An effective network access control should integrate the resource of the software and hardware reasonably and effectively. This can effectively guarantee the compatibility with the access devices and maximize the maintainers’ work efficiency. The users can realize the real-time data with the operation system. The network access control technology can track and analysis the user’s access behavior, this can stop further spread of the virus and upgrade the network’s ability to resist risk.The achievement of this paper as follows:introducing the present condition of network access control technology, describing how to the infrastructure of the network to enforce the security of the access devices (including PDA, UMPC and tablet computers). This can proactively avoid the destruction of the data in the intranet.The paper is targeted towards Windows Mobile operating system, realizes the fusion of the material resource management system and mobile check system and has gone into operation. It has a certain use value.
Keywords/Search Tags:Network Access Control, Security policy, Trusted terminal, Network security
PDF Full Text Request
Related items