期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A tentative study on security management based on dangerous goods road transportation
1
作者 SHANG Yue 《Chinese Business Review》 2009年第3期59-63,共5页
The paper conducts analysis on the causes of dangerous goods road transportation accidents by applying analytic technique of security system science - Event Tree Analysis (ETA). By computing minimum cut and minimal ... The paper conducts analysis on the causes of dangerous goods road transportation accidents by applying analytic technique of security system science - Event Tree Analysis (ETA). By computing minimum cut and minimal path set of event tree and the important level of elementary event, the paper elicits the results that the factors of causing road transportation accident are multiple and its hazard is great while the paper also elicits the sorting of structural important level of elementary event. The paper offers the security countermeasures for dangerous goods road transportation which plays a vital role in safeguarding dangerous goods road transportation security. 展开更多
关键词 dangerous goods transportation event tree analysis technology transportation security
下载PDF
Federated Learning Security and Privacy-Preserving Algorithm and Experiments Research Under Internet of Things Critical Infrastructure 被引量:1
2
作者 Nasir Ahmad Jalali Hongsong Chen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第2期400-414,共15页
The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band settings.Within such systems,all pa... The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band settings.Within such systems,all participants related to commercial and industrial systems must communicate and generate data.However,due to the small storage capacities of IoT devices,they are required to store and transfer the generated data to third-party entity called“cloud”,which creates one single point to store their data.However,as the number of participants increases,the size of generated data also increases.Therefore,such a centralized mechanism for data collection and exchange between participants is likely to face numerous challenges in terms of security,privacy,and performance.To address these challenges,Federated Learning(FL)has been proposed as a reasonable decentralizing approach,in which clients no longer need to transfer and store real data in the central server.Instead,they only share updated training models that are trained over their private datasets.At the same time,FL enables clients in distributed systems to share their machine learning models collaboratively without their training data,thus reducing data privacy and security challeges.However,slow model training and the execution of additional unnecessary communication rounds may hinder FL applications from operating properly in a distributed system.Furthermore,these unnecessary communication rounds make the system vulnerable to security and privacy issues,because irrelevant model updates are sent between clients and servers.Thus,in this work,we propose an algorithm for fully homomorphic encryption called Cheon-Kim-Kim-Song(CKKS)to encrypt model parameters for their local information privacy-preserving function.The proposed solution uses the impetus term to speed up model convergence during the model training process.Furthermore,it establishes a secure communication channel between IoT devices and the server.We also use a lightweight secure transport protocol to mitigate the communication overhead,thereby improving communication security and efficiency with low communication latency between client and server. 展开更多
关键词 Federated Learning(FL) Internet of Things(IoTs) lightweight transport Layer security(iTLS) Cheon-Kim-Kim-Song(CKKS)
原文传递
Protocol for Trusted Channel Based on Portable Trusted Module 被引量:1
3
作者 张大伟 韩臻 +2 位作者 蒋逸尘 杜晔 黎妹红 《China Communications》 SCIE CSCD 2013年第11期1-14,共14页
Web-based e-commerce applications need a trusted channel,which provides confidential communication,identity authentication and integrity assurance of endpoints,to guarantee the security of electronic transactions.A us... Web-based e-commerce applications need a trusted channel,which provides confidential communication,identity authentication and integrity assurance of endpoints,to guarantee the security of electronic transactions.A user-oriented trusted computing system based on Portable Trusted Module(PTM)is presented.Remote attestation is incorporated into Transport Layer Security(TLS)handshake protocol based on PTM so as to establish a trusted channel between two endpoints in network.This protocol can resist masquerading,trusted path and runtime attacks and propagate the trust in the computing system to the end user effectively.The test results of our proof-of-concept prototype show that our protocol for trusted channel is feasible for deployment in e-commerce applications on the Internet. 展开更多
关键词 trusted computing trusted module remote attestation transport layer security
下载PDF
Embedded TLS 1.2 Implementation for Smart Metering & Smart Grid Applications 被引量:1
4
作者 Atta Kofi Nsiah Axel Sikora +1 位作者 Andreas Walz Artem Yushev 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第4期373-378,共6页
Digital networked communications are the key to all Internet-of-things applications, but especially to smart metering systems and the smart grid. In order to ensure a safe operation of systems and the privacy of users... Digital networked communications are the key to all Internet-of-things applications, but especially to smart metering systems and the smart grid. In order to ensure a safe operation of systems and the privacy of users, the transport layer security (TLS) protocol, a mature and well standardized solution for secure communications, may be used. We implemented the TLS protocol in its latest version in a way suitable for embedded and resource-constrained systems. This paper outlines the challenges and opportunities of deploying TLS in smart metering and smart grid applications and presents performance results of our TLS implementation. Our analysis shows that given an appropriate implementation and configuration, deploying TLS in constrained smart metering systems is possible with acceptable overhead. 展开更多
关键词 Embedded software smart grids smart metering transport layer security.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部