期刊文献+

基于图和势函数的边缘计算移动智能终端安全评估

Mobile Intelligent Terminal System Security Evaluation Method based on Graph and Topological Potential
下载PDF
导出
摘要 智能终端安全威胁评估是终端安全工程的重要组成部分,对于制定系统安全策略具有重要意义。针对现在缺乏移动智能终端特点的安全评估方法的问题,使用基于图和拓扑势函数的移动智能终端安全威胁评估方法,通过计算威胁图中各个节点的熵值,确定其在威胁图中的重要程度,达到对移动智能终端进行安全评估的目的。最后采用上述方法进行了仿真,证明算法的可行性和正确性。后续对多类型和多数量的终端进行安全测评可利用边缘计算设备的计算资源,以实现对多个终端设备的客观准确评估。 Intelligent terminal security threat assessment,as an important part of terminal security engineering,is of great significance for the development of system security policies.Aiming at the lack of security assessment methods for mobile intelligent terminals,the mobile intelligent terminal security threat assessment method based on graph and topological potential function is proposed,which is used to determine the importance of each node in the threat graph by calculating the entropy value of each node in the threat graph,so as to achieve the purpose of security assessment for the mobile intelligent terminal.Finally,the above method is used to simulate and prove the feasibility and correctness of the algorithm.Subsequent security assessment of multiple types and numbers of terminals may utilize computing resources of the edge computing device and achieve objective and accurate evaluation of multiple terminal devices.
作者 陈柳霏 许爱东 侯文静 蒋屹新 文红 CHEN Liu-fei;XU Ai-dong;HOU Wen-jing;JIANG Yi-xin;WEN Hong(Sttate Key Laboratory of Science and Technology on Communications,UESTC,Chengdu Sichuan 611731,China;EPRI,China Southern Power Grid Co.,Ltd.,Guangzhou Guangdong 510000,China)
出处 《通信技术》 2019年第3期687-691,共5页 Communications Technology
基金 国家重大研发计划(No.2018YFB0904900 No.2018YFB0904905) 国家自然科学基金(No.61572114) 四川省科技基础条件平台项目(No.2018TJPT0041) 四川省科技服务业发展专项(No.18KJFWSF0368)~~
关键词 移动智能终端 安全威胁评估 势函数 边缘计算 mobile intelligent terminal security threat evaluation graph topological potential edge computing
  • 相关文献

参考文献4

二级参考文献26

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2United States General Accounting Office, Accounting and Information Management Division. Information Security Risk Assessment[Z]. Augest 1999.
  • 3National Institute of Standards and Technology. Special Publications 800-30, Risk Management Guide(DRAFT)[Z]. June 2001.
  • 4BUTLER S A, FISCHBECK P. Multi-Attribute Risk Assessment, Technical Report CMD-CS-01-169[R]. December 2001.
  • 5BUTLER S A. Security Attribute Evaluation Method: A Cost-Benefit Approach[Z]. Computer Science. Department, 2001.
  • 6PELTIER T R. Information Security Risk Analysis[Z]. Rothstein Associates Inc, 2001.
  • 7高自有 赵小梅 黄海军.城市交通网络的复杂性.复杂网络,2006,(11):186-215.
  • 8Porta S, Crucitti P, gatora V. The Netork Analysis of Urban Streets: a Primal Approach[J]. Environment and Planning B: Planning and Design, 2006, 33(5):705-725.
  • 9Hiller B, Hanson J. The Social Logic of Space[M]. Cambridge : Cambridge University Press, 1984.
  • 10Freeman L C. Centrality in Social Networks: I. Conceptual Clarification[J]. Social Networks, 1979 (1): 215-239.

共引文献815

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部