skip to main content
10.1145/3650215.3650262acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlcaConference Proceedingsconference-collections
research-article

Trusted access method of power financing terminal based on zero trust architecture under optimization algorithm

Published: 16 April 2024 Publication History

Abstract

In order to explore the solution of the trusted access method of power financing terminal, a trusted access method of power financing terminal based on zero trust architecture under optimization algorithm is proposed. This method explores the research of trusted access method of power financing terminals by recommending key technical problems and solutions represented by information based on zero trust architecture under optimization algorithms. Through the research, the trusted access method of power financing terminal based on the zero trust architecture under the optimization algorithm is about 24% more efficient than that of the traditional method. By testing the built secure access platform in the actual production environment of the power grid, it has a good performance in network access control, process monitoring management and data transmission encryption.

References

[1]
Jacobs, A., Williams, D., Hickey, K., Patrick, N., Williams, A. J., & Chalk, S., 2022. Cas common chemistry in 2021: expanding access to trusted chemical information for the scientific community. Journal of chemical information and modeling (11), 62.
[2]
Xia, H., & Yang, W. 2020. Security access solution of cloud services for trusted mobile terminals based on trustzone. International Journal of Network Security, 22(2), 201-211.
[3]
Arafa, A., Shin, W., Vaezi, M., & Poor, H. V. 2020. Secure relaying in non-orthogonal multiple access: trusted and untrusted scenarios. IEEE transactions on information forensics and security, 15(1), 210-222.
[4]
Ackerman, R. K. 2021. Applying zero trust to 5g changes networking. Signals (4), 76. Yin, F., & Shi, F. . (2022). Cluster optimization algorithm based on cpu and gpu hybrid architecture. Cluster computing (4), 25.
[5]
Hepworth, A. J., Baxter, D. P., Hussein, A., Yaxley, K. J., Debie, E., & Abbass, H. A. 2022. Human-swarm-teaming transparency and trust architecture. IEEE/CAA Journal of, Automatica Sinica, 8(7), 1281-1295.
[6]
Li, K., & Gao, G. 2021. Research on reactive power optimization of power system based on improved particle swarm algorith. Journal of Physics: Conference Series, 2136(1), 012045-.
[7]
Ruan, L., Guo, S., Qiu, X., Meng, L., Wu, S., & Buyya, R. 2021. Edge in-network computing meets blockchain: a multi-domain heterogeneous resource trust management architecture. IEEE Network: The Magazine of Computer Communications (5), 35.
[8]
Alevizos, L., Ta, V. T., & Eiza, M. H. 2022. Augmenting zero trust architecture to endpoints using blockchain: a state‐of‐the‐art review. Security and Privacy, 5(1), e191-.
[9]
Teitler, K. 2021. Building a zero trust architecture to support an enterprise. ISACA journal: The source for IT governance professionals (2-), 2.
[10]
Greenwood, D. 2021. Applying the principles of zero-trust architecture to protect sensitive and critical data. Network Security, 2021(6), 7-9.

Index Terms

  1. Trusted access method of power financing terminal based on zero trust architecture under optimization algorithm

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICMLCA '23: Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application
    October 2023
    1065 pages
    ISBN:9798400709449
    DOI:10.1145/3650215
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 April 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICMLCA 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 22
      Total Downloads
    • Downloads (Last 12 months)22
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media