Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network

Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network

Ying Zhang
Copyright: © 2022 |Volume: 13 |Issue: 6 |Pages: 11
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781668474075|DOI: 10.4018/IJDST.308003
Cite Article Cite Article

MLA

Zhang, Ying. "Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network." IJDST vol.13, no.6 2022: pp.1-11. http://doi.org/10.4018/IJDST.308003

APA

Zhang, Y. (2022). Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network. International Journal of Distributed Systems and Technologies (IJDST), 13(6), 1-11. http://doi.org/10.4018/IJDST.308003

Chicago

Zhang, Ying. "Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network," International Journal of Distributed Systems and Technologies (IJDST) 13, no.6: 1-11. http://doi.org/10.4018/IJDST.308003

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In order to solve the requirements of scheduling automation system for access control and the defects of access control model, an automatic access control model of power information system based on intelligent semantic network was designed. The overall structure of access control model of power information system is given. The detector is designed by artificial intelligence technology, combining artificial neural network and artificial immune algorithm, which provides the basis for checking access request module. By checking the access request module to find out whether there is a detector matching the access request, to judge whether the access request is legitimate. The verification results show that, the model can effectively support the access and modification of legitimate users and prevent the access of illegal users with high control precision.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.