<管理要求>的系统地位--4S的归纳(Sources,Series,Surrounding and Supporing>
1.<管理要求>的来源(Sources)
我们知道,我国颁布<计算机信息系统安全保护条例>在先,发布<计算机信息系统安全保护等级划分准则&g...<管理要求>的系统地位--4S的归纳(Sources,Series,Surrounding and Supporing>
1.<管理要求>的来源(Sources)
我们知道,我国颁布<计算机信息系统安全保护条例>在先,发布<计算机信息系统安全保护等级划分准则>(以下简称<准则>)在后,为了确保这样一个具有我国特色的,而且是原则性表述的<准则>能够有效实施,还必须依据它制定一系列的标准.展开更多
Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of s...Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.展开更多
文摘<管理要求>的系统地位--4S的归纳(Sources,Series,Surrounding and Supporing>
1.<管理要求>的来源(Sources)
我们知道,我国颁布<计算机信息系统安全保护条例>在先,发布<计算机信息系统安全保护等级划分准则>(以下简称<准则>)在后,为了确保这样一个具有我国特色的,而且是原则性表述的<准则>能够有效实施,还必须依据它制定一系列的标准.
文摘Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.