Trusted access method of power financing terminal based on zero trust architecture under optimization algorithm
Abstract
References
Index Terms
- Trusted access method of power financing terminal based on zero trust architecture under optimization algorithm
Recommendations
Secure Access Method of Power Internet of Things Based on Zero Trust Architecture
Advances in Swarm IntelligenceAbstractWith the development of the energy Internet, the terminals of the power Internet of Things are open and interactive, the grid protection boundary is ambiguous, and the traditional boundary based security system is difficult to ensure the secure ...
Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation
ACM SIGCOMM Posters and Demos '24: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and DemosGranting access and controlling access rights for online services is challenging in a highly dynamic and large-scale systems. In particular, the secure propagation of access right delegation is a major issue. Many proposals present access control issues ...
A Trust Aware Grid Access Control Architecture Based on ABAC
NAS '10: Proceedings of the 2010 IEEE Fifth International Conference on Networking, Architecture, and StorageGrid system has many great security challenges such as access control. The attribute-based access control model (ABAC) has much merits that are more flexible, fine-grained and dynamically suitable to grid environment. As an important factor in grid ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 22Total Downloads
- Downloads (Last 12 months)22
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format