Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement

In power Internet of Things environment, the existing border-based protection system and the “one-time authentication, one-time authorization, and long-term effective” approach are difficult to deal with the threat of attacks from internal and external devices and users with legal authority. In orde...

Full description

Bibliographic Details
Main Authors: Congcong Shi, Jiaxuan Fei, Xiaojian Zhang, Qigui Yao, Jie Fan
Format: Article
Language:English
Published: Hindawi Limited 2020-01-01
Series:Scientific Programming
Online Access:http://dx.doi.org/10.1155/2020/8895804