期刊文献+

电力作业“两票”合规性检测及基于OAuth2.0的数据授权管理研究

Research on compliance testing of“two tickets”for electric power operations and data authorization management based on OAuth2.0
下载PDF
导出
摘要 为解决电力作业中人工核查“两票”合规性效率低下的问题,文章对“两票”合规性自动检测方式进行了研究,认为利用Python编程、网页爬虫、规则引擎、数据处理等技术可以实现多种“两票”不合规情况一键自动检测和筛查,大大减轻了安全督查人员、基层审查人员人工核查“两票”的工作量,从而完成“两票”管理数字化转型“减负强安”。 In order to solve the problem of low efficiency in manual verification of“two tickets”compliance in power operations,this article studies the automatic testing method of“two tickets”compliance.It is believed that using Python programming,web crawlers,rule engines,data processing and other technologies can achieve one click automatic detection and screening of various“two tickets”non-compliance situations,greatly reducing the workload of safety inspectors and grassroots reviewers to manually verify“two tickets”,thereby completing the digital transformation of“two tickets”management and“reducing burden and strengthening safety”.
作者 罗序良 LUO Xuliang(Jiangmen Power Supply Bureau,Guangdong Power Grid Co.,Ltd.,Jiangmen 529000,China)
出处 《中国高新科技》 2024年第10期74-76,共3页
关键词 两票 自动核查 OAuth授权 two tickets automatic verification OAuth authorization
  • 相关文献

参考文献5

二级参考文献12

  • 1Dolev D, Yao A C. On the security of public key protocols[ J]. Information Theory, IEEE Transactions on, 1983, 29 (2) 198-208.
  • 2Sun S T, Hawkey K, Bezn,sov K. Systematically breaking and fixing OpenlD security: Formal analysis, semi-automated em- pirical evaluation, and praetical countermeasures[ J]. Computers & Security, 2012, 31 (4) : 465-483.
  • 3Tassanaviboon A, Gong G. OAuth and ABE based authorization in semi-trusted cloud computing: aauth[ C ]//Proceedings of the second international wor kshop on Data intensive computing in the clouds. 2011 : 41-50.
  • 4Pal S, Sharma Y, Kumar S, et al. Formal verification of OAuth 2.0 using Alloy framework [ C ]//Communication Systems and Network Technologies (CSNT) , 2011 International Conference on. 2011: 655-659.
  • 5Chari S, Jutla C S, Roy A Universally Composable Security Analysis of OAuth v2. 0[J]. IACR Cryptology ePrint Archive, 2011 : 526-527.
  • 6Sun S T, Beznosov K. The devil is in the (implementation) details: an empirical analysis of oauth sso systems[ C ]//Proceed- ings of the 2012.ACM cont) rence on Computer and communications security. 2012: 378-390.
  • 7Sun San-Tsai. Simple But Not Secure: An Empirical Security Analysis of OAuth 2.0-Based Single Sign-On Systems [ D]. U- niversity of British Columbi, Vancouver, 2012.
  • 8Armando A, Basin D, Boichut Y, et al. The AVISPA tool for the automated validation of internet security protocols and appli- cations[ C 1//Computer Aided Verification. 2005 : 281-285.
  • 9魏成坤,刘向东,石兆军.基于OAuth2.0的认证授权技术研究[J].信息网络安全,2016(9):6-11. 被引量:19
  • 10欧海文,付永亮,于芋,胡馨月.一种改进的OAuth授权机制有效性分析[J].计算机应用与软件,2017,34(12):196-201. 被引量:4

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部