2020
DOI: 10.1088/1742-6596/1673/1/012072
|View full text |Cite
|
Sign up to set email alerts
|

Terminal Security Configuration Optimization under Edge Computing

Abstract: It is an important task of system security management to configure terminal security policy reasonably in edge computing (EC) to implement necessary security protection for terminals and EC system. Therefore, this paper analyses the security goals and requirements of terminal access for multi-service EC systems under the power grid, conducts terminal security risk assessment based on the AHP algorithm, and proposes an edge computing platform terminal security configuration optimization strategy, creatively usi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 13 publications
0
0
0
Order By: Relevance