Proceedings of the First International Conference on Information Science and Electronic Technology

Study About the Trusted and Controllable Technology of the Information Network

Authors
Yu Wang, Weijie Han
Corresponding Author
Yu Wang
Available Online March 2015.
DOI
https://doi.org/10.2991/iset-15.2015.50How to use a DOI?
Keywords
Information network, Trusted technology, Controllable technology
Abstract
Firstly, the connotation of the trusted and controllable information network is introduced. Secondly, the key technologies are summarized for realizing the trusted and controllable network. Finally, the mechanism for building the trusted and controllable security architecture for the information network is designed.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
First International Conference on Information Science and Electronic Technology (ISET 2015)
Part of series
Advances in Computer Science Research
Publication Date
March 2015
ISBN
978-94-62520-50-9
DOI
https://doi.org/10.2991/iset-15.2015.50How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Yu Wang
AU  - Weijie Han
PY  - 2015/03
DA  - 2015/03
TI  - Study About the Trusted and Controllable Technology of the Information Network
BT  - First International Conference on Information Science and Electronic Technology (ISET 2015)
PB  - Atlantis Press
UR  - https://doi.org/10.2991/iset-15.2015.50
DO  - https://doi.org/10.2991/iset-15.2015.50
ID  - Wang2015/03
ER  -