A social-intelligence-inspired security integrated model for network information flow

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Inspired by social intelligence of individual's avoiding harm and auto-protect himself, a security-ring model for network information flow is proposed. The model extends TCP/IP security protocols and controls dynamic security of network information flow in four layers. These layers can cooperate to build closed-secure-channels and form a closed security-ring. In the model, security-channels have different security grades. The information flows are transmitted, deal with transactions, and exchange secret in these channels. The model can guarantee static and dynamic securities for information flows. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Meng, Q., & Ding, Y. (2006). A social-intelligence-inspired security integrated model for network information flow. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4113 LNCS-I, pp. 1092–1097). Springer Verlag. https://doi.org/10.1007/11816157_133

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free