期刊文献+

算力网络安全架构与数据安全治理技术 被引量:18

Computing Force Network Security Architecture and Data Security Governance Technology
下载PDF
导出
摘要 算力网络作为提供算力和网络深度融合、一体化服务的新型基础设施,为网络强国、数字中国、智慧社会建设提供重要支撑.当前算力网络规划建设已步入关键时期,算力网络安全相关工作正逐步推进,但尚未形成体系化的安全架构.总结国内外算力网络相关研究进展,分析算力网络面临的网络安全机遇和挑战,提出安全参考架构,并梳理安全支撑技术,为推动完善算力网络安全体系建设,部署应用算力网络安全机制提供参考. As a new information infrastructure which provides deep integration of computing force and network services,computing force network(CFN)provides important support for national cyber power,digital China and smart society.At present,the planning and construction of CFN has entered a critical period,and the work related to CFN security is gradually advancing,but the systematic security architecture has not been formed.This paper summarizes the relevant research progress of CFN,analyzes the security opportunities and challenges faced by CFN,and proposes a security reference architecture based on sorting out the key security technologies,so as to provide a reference for promoting the construction of CFN security system and deploying CFN security mechanism.
作者 邱勤 徐天妮 于乐 吕欣 袁捷 张峰 张滨 Qiu Qin;Xu Tianni;Yu Le;Lü Xin;Yuan Jie;Zhang Feng;Zhang Bin(China Mobile Communications Group Co.,Ltd.,Beijing 100053;State Information Center,Beijing 100045)
出处 《信息安全研究》 2022年第4期340-350,共11页 Journal of Information Security Research
基金 国家社会科学基金重大项目(19ZDA127)。
关键词 算力网络 新型基础设施 安全参考架构 编排安全 隐私计算 数据安全 人工智能 computing force network new information infrastructure security reference architecture orchestration security privacy computation data security artificial intelligence
  • 相关文献

参考文献22

二级参考文献88

  • 1贾凡,熊刚,朱凤华,田滨,韩双双,陈世超.基于MQTT的工业物联网通信系统研究与实现[J].智能科学与技术学报,2019,1(3):249-259. 被引量:19
  • 2于清林.从边缘计算到算力网络[J].产业科技创新,2020(3):49-51. 被引量:1
  • 3姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献2056

同被引文献70

引证文献18

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部