CFL BLP BC Model Based on Authentication and Blockchain
The advent of the 5G era has brought new challenges to the information security issues of the emerging information industry. The existing security technology can no longer meet the relevant requirements of millisecond-level authentication and trusted authentication in specific scenarios in the 5G er...
Gespeichert in:
Veröffentlicht in: | Ji suan ji ke xue 2021-11, Vol.48 (11), p.36-45 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | chi |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The advent of the 5G era has brought new challenges to the information security issues of the emerging information industry. The existing security technology can no longer meet the relevant requirements of millisecond-level authentication and trusted authentication in specific scenarios in the 5G era. Therefore, CFL technology is used. For the information security origin technology, the CFL_BLP_BC model is proposed. The CFL_BLP_BC model partially modifies the security axioms of the original BLP model, and combines the blockchain technology to formally describe the basic elements, security axioms and state transition rules of the model. This The model not only supports the five characteristics of information security, but also has information security attributes such as millisecond level, command level, and empirical system. The model supports endogenous security, innate immunity, and active defense technologies, and can provide important theoretical indicators for today's emerging information industry in cybe |
---|---|
ISSN: | 1002-137X |
DOI: | 10.11896/jsjkx.201000002 |