期刊文献+

智能通讯网络敏感信息连接可靠性监测仿真 被引量:1

Intelligent Communication Network Sensitive Information Connection Reliability Monitoring Simulation
在线阅读 下载PDF
导出
摘要 采用当前方法监测智能通讯网络中敏感信息的连接可靠性时,监测时间较长,得到的监测结果与实际不符,存在监测效率低和监测结果准确率低的问题。为了解决上述问题,提出一种智能通讯网络敏感信息连接可靠性监测方法,综合考虑信息在智能通讯网络中的结构信息和语义信息,计算信息在智能通讯网络中的敏感度,根据计算得到的信息敏感度检测智能通讯网络中存在的敏感信息。将风险矩阵法引入智能通讯网络敏感信息连接可靠性的监测中,结合层次分析法、Borda排序法和专家二维矩阵构建敏感信息连接可靠性评估模型,利用评估模型检测得到的敏感信息连接可靠性,根据评估结果完成对智能通讯网络敏感信息连接可靠性的监测。仿真实验结果表明,所提方法的监测效率高、监测结果准确率高。 Currently, the monitoring time is long and the monitoring result is inconsistent with the actual situation. Therefore, a method to monitor the connection reliability for sensitive information in intelligent communication network was proposed. After considering the structural information and semantic information in the intelligent communication network, the sensitive degree of information in intelligent communication network was calculated. Based on the sensitive degree, the sensitive information in intelligent communication network was detected. Moreover, the risk matrix method was introduced into the monitoring of connection reliability of sensitive information in intelligent communication network. Based on analytic hierarchy process, Borda ranking method and expert two-dimensional matrix, the reliability evaluation model of sensitive information connection was built. Finally, the evaluation model was used to detect the connection reliability of sensitive information. According to the evaluation result, we completed the monitoring of connection reliability of sensitive information in intelligent communication network. Simulation results show that the proposed method has high monitoring efficiency and high monitoring accuracy.
作者 倪铉珣 NI Xuan-xun(Yinxing Hospitality Management College of CUIT,Sichuan Chengdu 643000,China)
出处 《计算机仿真》 北大核心 2019年第7期449-453,共5页 Computer Simulation
基金 四川省电子商务与现代物流研究中心项目(DSWL18-8)
关键词 智能通讯网络 敏感信息 可靠性监测 Intelligent communication network Sensitive information Reliability monitoring
作者简介 倪铉珣(1983-),女(汉族),四川自贡人,硕士,讲师,主要研究方向:网络信息安全,企业信息化。
  • 相关文献

参考文献10

二级参考文献90

  • 1陈朋朋,郭忠文.传感设备模块接口标准化及可重用数据采集中间件设计[J].计算机研究与发展,2010,47(S2):288-292. 被引量:3
  • 2孙玉砚,刘卓华,李强,孙利民.一种面向3G接入的物联网安全架构[J].计算机研究与发展,2010,47(S2):327-332. 被引量:18
  • 3周明辉,梅宏,焦文品.基于中间件的可定制信任管理框架[J].电子学报,2005,33(5):820-826. 被引量:8
  • 4赵蕴龙,左德承,时锐,杨孝宗.移动自组网应用建模及无线收发器选用策略[J].电子学报,2005,33(7):1153-1157. 被引量:3
  • 5Waters B. Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions[ C]//Proceedings of the CRYPTO 2009. Santa Barbara: Springer,2009:619 - 636.
  • 6Estes A. Access control matrix[M] //Encyclopedia of Cryptography and Security. New York:Springer, 2011:12-13.
  • 7Jin Xin, Krishnan R, Sandhu R. A unified attribute-based access control model covering DAC, MAC and RBAC [ C ]//Proc of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Securityand Privaey XXVI. Berlin : Springer,2012 : 41 - 55.
  • 8Gafter N. Document access control:U. S. , 20070005595[P] . 2009-12-01.
  • 9Park J, Sanhu R. Towards usage control models:beyond traditional access control[C] //Proc of the 7th ACM Symposium on Access Control Models and Technologies. New York:ACM Press, 2002:57-64.
  • 10Park J, Sandhu R. The UCON ABC usage control model[J] . ACM Trans on Information and System Security, 2004, 7(1):128-174.

共引文献89

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部