Please wait a minute...
Computer & Telecommunication  2024, Vol. 1 Issue (6): 31-34    DOI: 10.15966/j.cnki.dnydx.2024.06.017
Current Issue | Archive | Adv Search |
A Trust Service Adaptation Method Based on Security Proxy
No.30 Institute of CETC
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  With the large-scale application of various services, protocol adaptation and security issues are becoming increasingly prominent. It has become a focus of attention in related industries to establish an uni?ed mechanism for trust service adaptation, and improve the availability and security of service adaptation. In the construction of industry network trust systems, the combination of di?erent services together forms a complete network trust service system, and there are increasingly more scenarios for forming distributed service systems. The interaction between trust services is frequent, and directly transplanting traditional service adaptation mechanisms to the trust service system will greatly reduce interaction e?ciency and scalability. Therefore, a trust service adaptation method based on secure proxies is proposed, which mainly solves the technical problems of service adaptation usability, scalability, and security. This scheme can meet the adaptive changes in service status, improve the availability of service adaptation, while ensuring the identities of both parties in the interaction and ensuring data security during the interaction process. 
Key wordsservice adaptation      trust system      security proxy      data security      distributed services      
Published: 01 November 2024

Cite this article:

DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy. Computer & Telecommunication, 2024, 1(6): 31-34.

URL:

https://www.computertelecom.com.cn/EN/10.15966/j.cnki.dnydx.2024.06.017     OR     https://www.computertelecom.com.cn/EN/Y2024/V1/I6/31

[1] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[2] YE Hui-qing.
Discussion on Application of 5G Customized Private Network for Vertical Industry
[J]. 电脑与电信, 2021, 0(10): 64-66.
[3] XIN Yan-shuang CHEN Si HAN Xiu-yuan. A Tele-collaboration Implementation Scheme Based on ICE[J]. 电脑与电信, 2019, 1(4): 61-65.
[4] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[5] ZHANG Yuan-yuan. Discussion on Data Security in Cloud Computing Environment[J]. 电脑与电信, 2017, 1(12): 64-66.
[6] HAN Lei, CHEN Han, HAO Xiao-xue. Research on Security Management Scheme of Enterprise Hadoop Big Data Platform[J]. 电脑与电信, 2017, 1(11): 40-43.
[7] Li Ruiqiang. Research on Cloud Computing Data Security Protection[J]. 电脑与电信, 2017, 1(10): 89-91.
[8] Kuang Hui. Analysis on the Significance of the Application of Big Data in Improving the Government Emergency Management Ability[J]. 电脑与电信, 2015, 1(10): 79-82.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd