End-point Security Authentication Technology and Its Development

ZHU Peng,XIE Xin,ZHOU Xian-jing,CHEN Shang-yi
DOI: https://doi.org/10.3969/j.issn.1009-8054.2010.02.027
2010-01-01
Abstract:End-point security authentication is becoming more important. The traditional access control technology based on IP address and MAC is not sufficient to meet the needs of network with high-level security requirement. Thus, many new end-point authentication technologies have been developed. These technologies integrate end-point health check with identity authentication. This paper discusses various technologies currently used in end-point authentication, points out their advantages and disadvantages. Finally, the future development of these technologies is described.
What problem does this paper attempt to address?