Study About the Trusted and Controllable Technology of the Information Network
- Yu Wang, Weijie Han
- Corresponding Author
- Yu Wang
Available Online March 2015.
- https://doi.org/10.2991/iset-15.2015.50How to use a DOI?
- Information network, Trusted technology, Controllable technology
- Firstly, the connotation of the trusted and controllable information network is introduced. Secondly, the key technologies are summarized for realizing the trusted and controllable network. Finally, the mechanism for building the trusted and controllable security architecture for the information network is designed.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Yu Wang AU - Weijie Han PY - 2015/03 DA - 2015/03 TI - Study About the Trusted and Controllable Technology of the Information Network BT - First International Conference on Information Science and Electronic Technology (ISET 2015) PB - Atlantis Press UR - https://doi.org/10.2991/iset-15.2015.50 DO - https://doi.org/10.2991/iset-15.2015.50 ID - Wang2015/03 ER -