面向隐式类型化资源的安全防护  

Security Provision for Implicit Typed Resources

在线阅读下载全文

作  者:段玉聪[1] 张欣悦 周长兵[2] 黄梦醒[1] 曹春杰[1] 周晓谊[1] DUAN Yucong;ZHANG Xinyue;ZHOU Zhangbing;HUANG Mengxing;CAO Chunjie;ZHOU Xiaoyi(School of Computer Science&Cyberspace Security,Hainan University,Haikou 570228,China;School of Information Engineering,China University of Geosciences,Beijing 100083,China)

机构地区:[1]海南大学计算机与网络空间安全学院,海口570228 [2]中国地质大学信息工程学院,北京100083

出  处:《计算机科学与探索》2019年第12期2061-2072,共12页Journal of Frontiers of Computer Science and Technology

基  金:海南省重点研发计划项目No.ZDYF2017128;国家自然科学基金Nos.61363007,61662021~~

摘  要:在物联网、边缘计算和大数据智能处理高速发展的背景下,安全保护研究的内容已经从显式内容保护扩展到了对隐式内容的保护。多来源内容背景下的隐式内容的安全保护对内容的采集、识别,保护策略定制,保护方法的建模、实现都提出了新的挑战。而实际应用中对性价比的追求更加剧了解决方案的挑战性。受DIKW方法启发提出将保护目标及背景内容分类为数据、信息和知识三种类型化资源。在DIKW上构建基于数据图谱、信息图谱和知识图谱的类型化资源安全资源保护架构。将目标安全资源根据它们在搜索空间中的存在形式分为显式的和隐式的资源,依据不同类型资源表达所对应的表达类型转换及搜索代价差异构造了对应的安全防护方案。该方案支持在不同类型转换过程中的代价以及转换后的搜索代价的差异基础上,设计并提供价值导向的安全服务。With the rapid development of internet of things,edge computing and intelligent big data processing,the content of security protection has been expanded from explicit content protection to implicit content protection.The security protection of implicit content in the context of multi-source content poses new challenges to the collection,identification,customization of protection strategies,modeling and implementation of protection methods.But in practice,the pursuit of performance/cost adds more challenge to the solution.Inspired by the DIKW(data,information,knowledge,wisdom)method,this paper proposes to classify the target of protection content and background content into three types of resources:data,information and knowledge.A typed resource security protection architecture based on data graph,information graph and knowledge graph is constructed on DIKW.Target security resources are divided into explicit and implicit resources according to their existing forms in the search space,and corresponding security protection schemes are constructed according to the conversion and search cost differences corresponding to different types of resource expressions.The scheme supports the design and provision of value driven security solutions based on the differences of the conversion cost of different types of resources and the search cost after conversion.

关 键 词:隐式类型化资源 安全防护 知识图谱 

分 类 号:TP301[自动化与计算机技术—计算机系统结构] TP309[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象