期刊文献+

智慧城市基础设施智能化的信息安全挑战 被引量:14

Information Security Challenges of Infrastructure Computerization of Intelligent Cities
下载PDF
导出
摘要 在国家"互联网+"和"中国制造2025"战略的背景下,随着智慧城市基础设施智能化目标的提出,城市关键基础设施正逐步变成网络化、智能化的信息物理系统,从而构成了新型的城市安全挑战。从智慧城市基础设施智能化内涵出发,分析城市智能基础设施信息安全风险的特征与来源,有助于提出相应的防护体系及对策建议。
出处 《上海城市管理》 2015年第5期35-39,共5页 Shanghai Urban Management
  • 相关文献

参考文献7

二级参考文献55

  • 1廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 2Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
  • 3Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
  • 4Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
  • 5Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
  • 6Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.
  • 7CHEN Xiangqian, Makki K, Yen K, et al. Sensor network security: A survey [J]. IEEE communications Surveys Tutorials, 2009, 11(2) : 52 - 73.
  • 8Asrar I. Could sexy space be the birth of the sms botnet? [Z/OL]. (2010-10-16), http: //www. symantec, corn/connect/ blogs/could-sexy-space-be-birth-sms-botnet.
  • 9Karygiannis T, Eydt B, Barber B, et al. Guidance for securing radio frequency identification (RFID) systems [Z/OL]. (2010-10-16), http: //www. google, com. hk/url? sa = t&source- web&cd = 1&ved -- 0CCIQFjAA&url = http%3A%2F%2Fwww, rfidsecurityalliance, org%2Fdocs %2FDraft SP800-98%2520-%2520Guidance%2520for%2520 Securing%2520RFID. pdf&ret = j%q -- XSBlaN5D X 09Guidance% 20for% 20Securing%20Radio% 20Frequency %20Identification%20(RFID) %20Systems. &ei = vxhwTqbYLa 64iAfk2LCtCQ&usg = AFQjCNGoB6IJZ12KcFBUkWh_ 5PWGkOQSpg&cad- rjt.
  • 10Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2002, 41 - 47.

共引文献124

同被引文献118

引证文献14

二级引证文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部