Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement
In power Internet of Things environment, the existing border-based protection system and the “one-time authentication, one-time authorization, and long-term effective” approach are difficult to deal with the threat of attacks from internal and external devices and users with legal authority. In orde...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2020-01-01
|
Series: | Scientific Programming |
Online Access: | http://dx.doi.org/10.1155/2020/8895804 |