http://dbpedia.org/ontology/abstract
|
Il Trusted Network Connect è un'architettu … Il Trusted Network Connect è un'architettura di rete aperta e non proprietaria basata sul protocollo AAA definita secondo le specifiche pubblicate dal Trusted Computing Group. Il Trusted Network Connect è compatibile con diversi protocolli di rete, tra cui 802.1x per le reti wireless, VPN per le reti private, RADIUS e DIAMETER per la sicurezza. Per garantire l'anonimità del processo, è possibile utilizzare il protocollo di Direct Anonymous Attestation implementato attraverso Trusted Platform Module. L'esercito americano userà il protocollo Trusted Network Connect per implementarlo nelle proprie reti informatiche; la National Security Agency stessa ha partecipato alla definizione delle sue specifiche.ato alla definizione delle sue specifiche.
, Trusted Network Connect (TNC) is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the Trusted Computing Group (TCG).
|
http://dbpedia.org/ontology/wikiPageExternalLink
|
http://www.darkreading.com/security/perimeter/showArticle.jhtml%3FarticleID=217500658 +
, https://ieeexplore.ieee.org/document/5480880 +
, http://www.computerworld.com/s/article/101608/Vendor_Group_Adds_Net_Access_Specs%3FtaxonomyId=016 +
, http://www.urunkoruma.com/content/securing-scada-and-control-networks +
, http://www.scmagazineus.com/naked-endpoints-on-your-net-and-what-to-do-about-them/article/165892/ +
, https://www.trustedcomputinggroup.org/solutions/network_access_and_identity/ +
, https://www.trustedcomputinggroup.org/developers/trusted_network_connect/ +
, http://www.urunkoruma.com/ +
, http://www.informationweek.com/news/hardware/desktop/showArticle.jhtml%3FarticleID=180201733 +
, https://github.com/hirendra-rathor/TNCSDK +
|
http://dbpedia.org/ontology/wikiPageID
|
4473890
|
http://dbpedia.org/ontology/wikiPageLength
|
9306
|
http://dbpedia.org/ontology/wikiPageRevisionID
|
1105563105
|
http://dbpedia.org/ontology/wikiPageWikiLink
|
http://dbpedia.org/resource/RSA_Conference +
, http://dbpedia.org/resource/South_Carolina_Department_of_Probation%2C_Parole%2C_and_Pardon_Services +
, http://dbpedia.org/resource/Trusted_Internet_Connection +
, http://dbpedia.org/resource/Avenda_Systems +
, http://dbpedia.org/resource/StrongSwan +
, http://dbpedia.org/resource/Trapeze_Networks +
, http://dbpedia.org/resource/Hewlett-Packard +
, http://dbpedia.org/resource/Trusted_Computing_Group +
, http://dbpedia.org/resource/Juniper_Networks +
, http://dbpedia.org/resource/Category:Trusted_computing +
, http://dbpedia.org/resource/Trusted_Computing +
, http://dbpedia.org/resource/Network_Access_Control +
, http://dbpedia.org/resource/IBM +
, http://dbpedia.org/resource/Enterasys +
, http://dbpedia.org/resource/Microsoft +
, http://dbpedia.org/resource/Fujitsu +
, http://dbpedia.org/resource/Extreme_Networks +
, http://dbpedia.org/resource/NortonLifeLock +
, http://dbpedia.org/resource/Cisco +
, http://dbpedia.org/resource/Aruba_Networks +
, http://dbpedia.org/resource/Security_Content_Automation_Protocol +
, http://dbpedia.org/resource/McAfee +
, http://dbpedia.org/resource/IF-MAP +
, http://dbpedia.org/resource/Industrial_Control_System +
, http://dbpedia.org/resource/ArcSight +
, http://dbpedia.org/resource/Category:Computer_network_security +
, http://dbpedia.org/resource/Pulse_Secure +
, http://dbpedia.org/resource/Tofino +
, http://dbpedia.org/resource/Nortel +
, http://dbpedia.org/resource/ProCurve +
, http://dbpedia.org/resource/Open_architecture +
, http://dbpedia.org/resource/SCADA +
, http://dbpedia.org/resource/Lumeta +
|
http://dbpedia.org/property/wikiPageUsesTemplate
|
http://dbpedia.org/resource/Template:Reflist +
, http://dbpedia.org/resource/Template:Col-end +
, http://dbpedia.org/resource/Template:Col-begin +
, http://dbpedia.org/resource/Template:Col-break +
, http://dbpedia.org/resource/Template:More_citations_needed +
|
http://purl.org/dc/terms/subject
|
http://dbpedia.org/resource/Category:Trusted_computing +
, http://dbpedia.org/resource/Category:Computer_network_security +
|
http://purl.org/linguistics/gold/hypernym
|
http://dbpedia.org/resource/Architecture +
|
http://www.w3.org/ns/prov#wasDerivedFrom
|
http://en.wikipedia.org/wiki/Trusted_Network_Connect?oldid=1105563105&ns=0 +
|
http://xmlns.com/foaf/0.1/isPrimaryTopicOf
|
http://en.wikipedia.org/wiki/Trusted_Network_Connect +
|
owl:sameAs |
http://rdf.freebase.com/ns/m.0c4f_v +
, http://dbpedia.org/resource/Trusted_Network_Connect +
, http://www.wikidata.org/entity/Q3999882 +
, http://it.dbpedia.org/resource/Trusted_Network_Connect +
, https://global.dbpedia.org/id/3hahr +
|
rdf:type |
http://dbpedia.org/ontology/Company +
|
rdfs:comment |
Il Trusted Network Connect è un'architettu … Il Trusted Network Connect è un'architettura di rete aperta e non proprietaria basata sul protocollo AAA definita secondo le specifiche pubblicate dal Trusted Computing Group. Il Trusted Network Connect è compatibile con diversi protocolli di rete, tra cui 802.1x per le reti wireless, VPN per le reti private, RADIUS e DIAMETER per la sicurezza. Per garantire l'anonimità del processo, è possibile utilizzare il protocollo di Direct Anonymous Attestation implementato attraverso Trusted Platform Module. L'esercito americano userà il protocollo Trusted Network Connect per implementarlo nelle proprie reti informatiche; la National Security Agency stessa ha partecipato alla definizione delle sue specifiche.ato alla definizione delle sue specifiche.
, Trusted Network Connect (TNC) is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the Trusted Computing Group (TCG).
|
rdfs:label |
Trusted Network Connect
|