面向隐式类型化资源的安全防护

TP301%TP309; 在物联网、边缘计算和大数据智能处理高速发展的背景下,安全保护研究的内容已经从显式内容保护扩展到了对隐式内容的保护.多来源内容背景下的隐式内容的安全保护对内容的采集、识别,保护策略定制,保护方法的建模、实现都提出了新的挑战.而实际应用中对性价比的追求更加剧了解决方案的挑战性.受DIKW方法启发提出将保护目标及背景内容分类为数据、信息和知识三种类型化资源.在DIKW上构建基于数据图谱、信息图谱和知识图谱的类型化资源安全资源保护架构.将目标安全资源根据它们在搜索空间中的存在形式分为显式的和隐式的资源,依据不同类型资源表达所对应的表达类型转换及搜索代价差异构造了对应的安全防护...

Full description

Saved in:
Bibliographic Details
Published in计算机科学与探索 Vol. 13; no. 12; pp. 2061 - 2072
Main Authors 段玉聪, 张欣悦, 周长兵, 黄梦醒, 曹春杰, 周晓谊
Format Journal Article
LanguageChinese
Published 海南大学 计算机与网络空间安全学院,海口,570228%中国地质大学 信息工程学院,北京,100083 01.12.2019
Subjects
Online AccessGet full text
ISSN1673-9418
DOI10.3778/j.issn.1673-9418.1810016

Cover

Loading…
Abstract TP301%TP309; 在物联网、边缘计算和大数据智能处理高速发展的背景下,安全保护研究的内容已经从显式内容保护扩展到了对隐式内容的保护.多来源内容背景下的隐式内容的安全保护对内容的采集、识别,保护策略定制,保护方法的建模、实现都提出了新的挑战.而实际应用中对性价比的追求更加剧了解决方案的挑战性.受DIKW方法启发提出将保护目标及背景内容分类为数据、信息和知识三种类型化资源.在DIKW上构建基于数据图谱、信息图谱和知识图谱的类型化资源安全资源保护架构.将目标安全资源根据它们在搜索空间中的存在形式分为显式的和隐式的资源,依据不同类型资源表达所对应的表达类型转换及搜索代价差异构造了对应的安全防护方案.该方案支持在不同类型转换过程中的代价以及转换后的搜索代价的差异基础上,设计并提供价值导向的安全服务.
AbstractList TP301%TP309; 在物联网、边缘计算和大数据智能处理高速发展的背景下,安全保护研究的内容已经从显式内容保护扩展到了对隐式内容的保护.多来源内容背景下的隐式内容的安全保护对内容的采集、识别,保护策略定制,保护方法的建模、实现都提出了新的挑战.而实际应用中对性价比的追求更加剧了解决方案的挑战性.受DIKW方法启发提出将保护目标及背景内容分类为数据、信息和知识三种类型化资源.在DIKW上构建基于数据图谱、信息图谱和知识图谱的类型化资源安全资源保护架构.将目标安全资源根据它们在搜索空间中的存在形式分为显式的和隐式的资源,依据不同类型资源表达所对应的表达类型转换及搜索代价差异构造了对应的安全防护方案.该方案支持在不同类型转换过程中的代价以及转换后的搜索代价的差异基础上,设计并提供价值导向的安全服务.
Abstract_FL With the rapid development of internet of things, edge computing and intelligent big data processing, the content of security protection has been expanded from explicit content protection to implicit content protection. The security protection of implicit content in the context of multi-source content poses new challenges to the collection, identification, customization of protection strategies, modeling and implementation of protection methods. But in practice, the pursuit of performance/cost adds more challenge to the solution. Inspired by the DIKW (data, infor-mation, knowledge, wisdom) method, this paper proposes to classify the target of protection content and background content into three types of resources: data, information and knowledge. A typed resource security protection architecture based on data graph, information graph and knowledge graph is constructed on DIKW. Target security resources are divided into explicit and implicit resources according to their existing forms in the search space, and corresponding security protection schemes are constructed according to the conversion and search cost differences corresponding to different types of resource expressions. The scheme supports the design and provision of value driven security solutions based on the differences of the conversion cost of different types of resources and the search cost after conversion.
Author 张欣悦
周长兵
黄梦醒
曹春杰
段玉聪
周晓谊
AuthorAffiliation 海南大学 计算机与网络空间安全学院,海口,570228%中国地质大学 信息工程学院,北京,100083
AuthorAffiliation_xml – name: 海南大学 计算机与网络空间安全学院,海口,570228%中国地质大学 信息工程学院,北京,100083
Author_FL ZHOU Xiaoyi
CAO Chunjie
ZHANG Xinyue
ZHOU Zhangbing
HUANG Mengxing
DUAN Yucong
Author_FL_xml – sequence: 1
  fullname: DUAN Yucong
– sequence: 2
  fullname: ZHANG Xinyue
– sequence: 3
  fullname: ZHOU Zhangbing
– sequence: 4
  fullname: HUANG Mengxing
– sequence: 5
  fullname: CAO Chunjie
– sequence: 6
  fullname: ZHOU Xiaoyi
Author_xml – sequence: 1
  fullname: 段玉聪
– sequence: 2
  fullname: 张欣悦
– sequence: 3
  fullname: 周长兵
– sequence: 4
  fullname: 黄梦醒
– sequence: 5
  fullname: 曹春杰
– sequence: 6
  fullname: 周晓谊
BookMark eNo9jT1LAzEYgDNUsNb-B1eFO_Pm45KMUvyCgovOJZdLpKekYBR1r4Mf0HMRKeggDk6Cgov6d9J6_0JBcXrgGZ5nDjX8wFuEFgCnVAi5XKb9EHwKmaCJYiBTkIAxZA3U_HezqB1CP8ecMQIik020VN89xOq6HlfxczR9-Yj3l_Hq5uttOHmvpuNhfD6PZ0_17evk4nEezTi9H2z7jy20s7a63dlIulvrm52VbhIAM5UAk46QQkheaCcZVyY3WFrQzupCM6BO5oIYS6gpLDCbGWW51kIojqkThrbQ4m_3WHun_W6vHBwd-J9jrwzl3snpYSAYFBCMFf0G25dXgw
ClassificationCodes TP301%TP309
ContentType Journal Article
Copyright Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
Copyright_xml – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
DBID 2B.
4A8
92I
93N
PSX
TCJ
DOI 10.3778/j.issn.1673-9418.1810016
DatabaseName Wanfang Data Journals - Hong Kong
WANFANG Data Centre
Wanfang Data Journals
万方数据期刊 - 香港版
China Online Journals (COJ)
China Online Journals (COJ)
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
DocumentTitle_FL Security Provision for Implicit Typed Resources
EndPage 2072
ExternalDocumentID jsjkxyts201912009
GrantInformation_xml – fundername: The Key Research and Development Project of Hainan Province under Grant No.ZDYF2017128; the National Natural Science Foundation of China under Grant Nos.61363007,61662021
GroupedDBID 2B.
4A8
92I
93N
ALMA_UNASSIGNED_HOLDINGS
M~E
PSX
TCJ
ID FETCH-LOGICAL-s1049-148f22d785daf8459cbc08e1afeada413f8b72ce23cde14e6c9e5aa779503f7c3
ISSN 1673-9418
IngestDate Thu May 29 04:00:17 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 12
Keywords implicit typed resources
安全防护
隐式类型化资源
知识图谱
knowledge graph
security provision
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1049-148f22d785daf8459cbc08e1afeada413f8b72ce23cde14e6c9e5aa779503f7c3
PageCount 12
ParticipantIDs wanfang_journals_jsjkxyts201912009
PublicationCentury 2000
PublicationDate 2019-12-01
PublicationDateYYYYMMDD 2019-12-01
PublicationDate_xml – month: 12
  year: 2019
  text: 2019-12-01
  day: 01
PublicationDecade 2010
PublicationTitle 计算机科学与探索
PublicationTitle_FL Journal of Frontiers of Computer Science & Technology
PublicationYear 2019
Publisher 海南大学 计算机与网络空间安全学院,海口,570228%中国地质大学 信息工程学院,北京,100083
Publisher_xml – name: 海南大学 计算机与网络空间安全学院,海口,570228%中国地质大学 信息工程学院,北京,100083
SSID ssib054421768
ssib002040941
ssib002423894
ssib051375751
ssib023646573
ssib036438069
ssib002040926
Score 2.179559
Snippet TP301%TP309;...
SourceID wanfang
SourceType Aggregation Database
StartPage 2061
Title 面向隐式类型化资源的安全防护
URI https://d.wanfangdata.com.cn/periodical/jsjkxyts201912009
Volume 13
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Na9RAFA-lXryIouI3RZxLJWtmMpOZOSZpliLUUwu9lSSbKBVW6G5Be_BUD36A60WkoAfx4ElQ8KL-O9va_8L3XrLZtFapXpaXyW_eZ3bem92ZjOPc4KpXqkxZ18t07kqtlWsUzFKsMim-gSw3dHTC0p1gcUXeXlWrM7PzrVVLm8Osk28dua_kf6IKbRBX3CX7D5FtmEID0BBf-IQIw-exYswSy-wCCwVLFLMes5xaQqShJYqZ6bJEs4izKCJMwgwRJmY2YIlhEdCSJQGLql4au2OLYiGALYGBNsQZ8ALBJmShbNe1yArwIUcOQFiNMBsjW2zRpBvwAW1BrmSRYSYhVgnpD0pKICbxxzvABrSDO6ZSBHpwFoZTCFkYeoQFwid2AgS0ISC3Vh7g3dqcSE0hFn1T-SAUpJ1lBnQX7R9EuD20uIRcBow0cVwgg8E8iaZO7Lz5V680PgDTF8g9GjWBuwi2hLHYJToyGo0vAWNRcxEf1KmLHhGx0vjuISZULRF6oVciFIoEKOPRgyAnbA_bINFvaENAASAfgoyQYgN9qifqCG2qx0wThxBDJGJO1XgrEwbad62sk-MkVfrtIUG0E59XvVO_LqKEVx3IdDhB-1obStAoo9PI6ECdiZOPaVHSLBVdH6zff_hoOMBI82qv7gkBU0I8pmXpcTItNSEb2fZUGa_lgT3bUJs3uQfPTQjUtHSHS994QVPaK-5r_EuyuZYSJu_VztqJ1tXCQDTp1p8Moq2A_TLt321VrcunnVP1dHMurMaOM87M1r2zzvz-2_fj0av9ndH4x8u9z9_H756PX7z--XV799tob2d7_Onp-MnH_Tdfdp99OOesdJPleNGtz0xxBxwm-y6XphSip43qpaWRyuZZ7pmCpyWkjBQq1tJkWuSF8PNewWUR5LZQaaq1VZ5f6tw_78z2H_SLC85cr0wFjNhpITMpS5nBVZoaL-O4HV4Y76JzvbZtrR4TB2u_RevScUCXnZPTL_IVZ3a4sVlchVp_mF2jIP8CKXeuug
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E9%9D%A2%E5%90%91%E9%9A%90%E5%BC%8F%E7%B1%BB%E5%9E%8B%E5%8C%96%E8%B5%84%E6%BA%90%E7%9A%84%E5%AE%89%E5%85%A8%E9%98%B2%E6%8A%A4&rft.jtitle=%E8%AE%A1%E7%AE%97%E6%9C%BA%E7%A7%91%E5%AD%A6%E4%B8%8E%E6%8E%A2%E7%B4%A2&rft.au=%E6%AE%B5%E7%8E%89%E8%81%AA&rft.au=%E5%BC%A0%E6%AC%A3%E6%82%A6&rft.au=%E5%91%A8%E9%95%BF%E5%85%B5&rft.au=%E9%BB%84%E6%A2%A6%E9%86%92&rft.date=2019-12-01&rft.pub=%E6%B5%B7%E5%8D%97%E5%A4%A7%E5%AD%A6+%E8%AE%A1%E7%AE%97%E6%9C%BA%E4%B8%8E%E7%BD%91%E7%BB%9C%E7%A9%BA%E9%97%B4%E5%AE%89%E5%85%A8%E5%AD%A6%E9%99%A2%2C%E6%B5%B7%E5%8F%A3%2C570228%25%E4%B8%AD%E5%9B%BD%E5%9C%B0%E8%B4%A8%E5%A4%A7%E5%AD%A6+%E4%BF%A1%E6%81%AF%E5%B7%A5%E7%A8%8B%E5%AD%A6%E9%99%A2%2C%E5%8C%97%E4%BA%AC%2C100083&rft.issn=1673-9418&rft.volume=13&rft.issue=12&rft.spage=2061&rft.epage=2072&rft_id=info:doi/10.3778%2Fj.issn.1673-9418.1810016&rft.externalDocID=jsjkxyts201912009
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fjsjkxyts%2Fjsjkxyts.jpg