检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:段玉聪[1] 张欣悦 周长兵[2] 黄梦醒[1] 曹春杰[1] 周晓谊[1] DUAN Yucong;ZHANG Xinyue;ZHOU Zhangbing;HUANG Mengxing;CAO Chunjie;ZHOU Xiaoyi(School of Computer Science&Cyberspace Security,Hainan University,Haikou 570228,China;School of Information Engineering,China University of Geosciences,Beijing 100083,China)
机构地区:[1]海南大学计算机与网络空间安全学院,海口570228 [2]中国地质大学信息工程学院,北京100083
出 处:《计算机科学与探索》2019年第12期2061-2072,共12页Journal of Frontiers of Computer Science and Technology
基 金:海南省重点研发计划项目No.ZDYF2017128;国家自然科学基金Nos.61363007,61662021~~
摘 要:在物联网、边缘计算和大数据智能处理高速发展的背景下,安全保护研究的内容已经从显式内容保护扩展到了对隐式内容的保护。多来源内容背景下的隐式内容的安全保护对内容的采集、识别,保护策略定制,保护方法的建模、实现都提出了新的挑战。而实际应用中对性价比的追求更加剧了解决方案的挑战性。受DIKW方法启发提出将保护目标及背景内容分类为数据、信息和知识三种类型化资源。在DIKW上构建基于数据图谱、信息图谱和知识图谱的类型化资源安全资源保护架构。将目标安全资源根据它们在搜索空间中的存在形式分为显式的和隐式的资源,依据不同类型资源表达所对应的表达类型转换及搜索代价差异构造了对应的安全防护方案。该方案支持在不同类型转换过程中的代价以及转换后的搜索代价的差异基础上,设计并提供价值导向的安全服务。With the rapid development of internet of things,edge computing and intelligent big data processing,the content of security protection has been expanded from explicit content protection to implicit content protection.The security protection of implicit content in the context of multi-source content poses new challenges to the collection,identification,customization of protection strategies,modeling and implementation of protection methods.But in practice,the pursuit of performance/cost adds more challenge to the solution.Inspired by the DIKW(data,information,knowledge,wisdom)method,this paper proposes to classify the target of protection content and background content into three types of resources:data,information and knowledge.A typed resource security protection architecture based on data graph,information graph and knowledge graph is constructed on DIKW.Target security resources are divided into explicit and implicit resources according to their existing forms in the search space,and corresponding security protection schemes are constructed according to the conversion and search cost differences corresponding to different types of resource expressions.The scheme supports the design and provision of value driven security solutions based on the differences of the conversion cost of different types of resources and the search cost after conversion.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.220.1.197