%0 Conference Proceedings %T Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks %+ DECOIT GmbH %+ Fraunhofer Institute for Secure Information Technology [Darmstadt] (Fraunhofer SIT) %+ University of Applied Science of Bremen %A Detken, Kai-Oliver %A Fhom, Hervais Simo %A Sethmann, Richard %A Diederich, Günther %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B Third IFIP TC6 International Conference on Wireless Communications and Information Technology in Developing Countries (WCITD) / IFIP TC 6 International Network of the Future Conference (NF) / Held as Part of World Computer Congress (WCC) %C Brisbane, Australia %Y Ana Pont; Guy Pujolle; S. V. Raghavan %I Springer %3 Communications: Wireless in Developing Countries and Networks of the Future %V AICT-327 %P 158-169 %8 2010-09-20 %D 2010 %R 10.1007/978-3-642-15476-8_16 %K Network Access Protection (NAP) %K Network Access Control (NAC) %K Trusted Computing Group (TCG) %K Trusted Network Connect (TNC) %K Trusted Platform Module (TPM) %K SIMOIT %K TNC@FHH %K VOGUE %Z Computer Science [cs]/Digital Libraries [cs.DL]Conference papers %X The approach described in this paper is part of the German national research project VOGUE. VOGUE leverages trusted network connect concepts as a key to implement/design a holistic and vendor neutral network access system while addressing shortcomings of traditional network access control mechanisms. The rest of the paper is organized as follows: Section 2 provides the motivation that outlines the importance of validating mobile devices state of health before allowing access to the enterprise network and gives a brief overview of the background on Trusted Network Connect (TNC). Furthermore, the section describes the security risks, challenges and requirements that are relevant to interoperable network access control and authorization. Next, we discuss in section 4 existing solutions and other industry standards and specifications that have had an influence on our work. The paper concludes with section 5. %G English %2 https://inria.hal.science/hal-01054748/document %2 https://inria.hal.science/hal-01054748/file/8-_Detken.pdf %L hal-01054748 %U https://inria.hal.science/hal-01054748 %~ IFIP %~ IFIP-AICT %~ IFIP-AICT-327 %~ IFIP-TC %~ IFIP-TC6 %~ IFIP-WCITD %~ IFIP-NF %~ IFIP-WCC %~ IFIP-2010