{"id":"https://openalex.org/W4312097523","doi":"https://doi.org/10.1109/cisp-bmei56279.2022.9980140","title":"A Restructable Strategy of Information Transmission Security Architecture in Edge Computing","display_name":"A Restructable Strategy of Information Transmission Security Architecture in Edge Computing","publication_year":2022,"publication_date":"2022-11-05","ids":{"openalex":"https://openalex.org/W4312097523","doi":"https://doi.org/10.1109/cisp-bmei56279.2022.9980140"},"language":"en","primary_location":{"id":"doi:10.1109/cisp-bmei56279.2022.9980140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei56279.2022.9980140","pdf_url":null,"source":{"id":"https://openalex.org/S4363605502","display_name":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101007662","display_name":"Wenya Song","orcid":null},"institutions":[{"id":"https://openalex.org/I15823474","display_name":"Linyi University","ror":"https://ror.org/01knv0402","country_code":"CN","type":"education","lineage":["https://openalex.org/I15823474"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenya Song","raw_affiliation_strings":["Linyi University, School of Information Science and Engineering,Linyi,China","Linyi University, School of Information Science and Engineering, Linyi, China"],"affiliations":[{"raw_affiliation_string":"Linyi University, School of Information Science and Engineering,Linyi,China","institution_ids":["https://openalex.org/I15823474"]},{"raw_affiliation_string":"Linyi University, School of Information Science and Engineering, Linyi, China","institution_ids":["https://openalex.org/I15823474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100728770","display_name":"Jinwei Tian","orcid":"https://orcid.org/0000-0002-2730-0033"},"institutions":[{"id":"https://openalex.org/I15823474","display_name":"Linyi University","ror":"https://ror.org/01knv0402","country_code":"CN","type":"education","lineage":["https://openalex.org/I15823474"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinwei Tian","raw_affiliation_strings":["Linyi University, School of Information Science and Engineering,Linyi,China","Linyi University, School of Information Science and Engineering, Linyi, China"],"affiliations":[{"raw_affiliation_string":"Linyi University, School of Information Science and Engineering,Linyi,China","institution_ids":["https://openalex.org/I15823474"]},{"raw_affiliation_string":"Linyi University, School of Information Science and Engineering, Linyi, China","institution_ids":["https://openalex.org/I15823474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101728157","display_name":"Xiaole Li","orcid":"https://orcid.org/0000-0002-4517-4691"},"institutions":[{"id":"https://openalex.org/I15823474","display_name":"Linyi University","ror":"https://ror.org/01knv0402","country_code":"CN","type":"education","lineage":["https://openalex.org/I15823474"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaole Li","raw_affiliation_strings":["Linyi University, School of Information Science and Engineering,Linyi,China","Linyi University, School of Information Science and Engineering, Linyi, China"],"affiliations":[{"raw_affiliation_string":"Linyi University, School of Information Science and Engineering,Linyi,China","institution_ids":["https://openalex.org/I15823474"]},{"raw_affiliation_string":"Linyi University, School of Information Science and Engineering, Linyi, China","institution_ids":["https://openalex.org/I15823474"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100365501","display_name":"Xing Wang","orcid":"https://orcid.org/0000-0002-5330-5161"},"institutions":[{"id":"https://openalex.org/I15823474","display_name":"Linyi University","ror":"https://ror.org/01knv0402","country_code":"CN","type":"education","lineage":["https://openalex.org/I15823474"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xing Wang","raw_affiliation_strings":["Linyi University, School of Information Science and Engineering,Linyi,China","Linyi University, School of Information Science and Engineering, Linyi, China"],"affiliations":[{"raw_affiliation_string":"Linyi University, School of Information Science and Engineering,Linyi,China","institution_ids":["https://openalex.org/I15823474"]},{"raw_affiliation_string":"Linyi University, School of Information Science and Engineering, Linyi, China","institution_ids":["https://openalex.org/I15823474"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101007662"],"corresponding_institution_ids":["https://openalex.org/I15823474"],"apc_list":null,"apc_paid":null,"fwci":0.1457,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.42459397,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"40","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8433754444122314},{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.6074166893959045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5778822898864746},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.5658114552497864},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5102319717407227},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4957960546016693},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4844958484172821},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.47707831859588623},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.4697796702384949},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.46110042929649353},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.43878239393234253},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.37895119190216064},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3207130432128906},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2985936403274536},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.23173615336418152},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11766567826271057}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8433754444122314},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.6074166893959045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5778822898864746},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.5658114552497864},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5102319717407227},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4957960546016693},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4844958484172821},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.47707831859588623},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4697796702384949},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.46110042929649353},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.43878239393234253},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.37895119190216064},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3207130432128906},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2985936403274536},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.23173615336418152},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11766567826271057}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisp-bmei56279.2022.9980140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei56279.2022.9980140","pdf_url":null,"source":{"id":"https://openalex.org/S4363605502","display_name":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4842664811","display_name":null,"funder_award_id":"ZR2020MF058,ZR2020MF029,ZR2019YQ28","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"},{"id":"https://openalex.org/G6001260286","display_name":null,"funder_award_id":"61972228","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1569881051","https://openalex.org/W1602381506","https://openalex.org/W2021569687","https://openalex.org/W2184348642","https://openalex.org/W2373704778","https://openalex.org/W2385751432","https://openalex.org/W2482535280","https://openalex.org/W2752929869","https://openalex.org/W2919665250","https://openalex.org/W2971282859","https://openalex.org/W3001577079","https://openalex.org/W3021142102","https://openalex.org/W3158841814","https://openalex.org/W6636053242","https://openalex.org/W6686185659","https://openalex.org/W6782179865"],"related_works":["https://openalex.org/W2355659962","https://openalex.org/W422595749","https://openalex.org/W2347675566","https://openalex.org/W2171379621","https://openalex.org/W2008985775","https://openalex.org/W198076453","https://openalex.org/W2784006287","https://openalex.org/W2515916393","https://openalex.org/W2146279741","https://openalex.org/W2979370664"],"abstract_inverted_index":{"The":[0],"design":[1,14,23],"process":[2],"of":[3,10,35,67,75,98,105,141,156],"security":[4,46,59,90,103,120,128,132,144,166,180],"architecture":[5,47,129,181],"in":[6,48,122],"edge":[7,49,123],"computing":[8],"is":[9,15],"high":[11],"complexity.":[12],"Manual":[13],"always":[16],"inefficient":[17],"and":[18,69,72,80,113,130,158,167,176],"error":[19],"prone,":[20],"while":[21],"automatic":[22,54],"cannot":[24],"be":[25,85,147],"widely":[26],"used":[27],"due":[28],"to":[29,56,88,94,119],"calculation":[30],"explosion.":[31],"Combining":[32],"the":[33,95,138,169],"goodness":[34],"these":[36],"two":[37],"ways,":[38],"we":[39,52,101,125],"propose":[40],"a":[41,173],"new":[42,170],"restructable":[43,99],"strategy":[44,171],"for":[45,61,150,179],"computing.":[50],"Firstly,":[51],"leverage":[53],"tool":[55],"generate":[57],"critical":[58],"activities":[60],"information":[62,108,110,142],"transmission,":[63,143],"including":[64],"challenge-response,":[65],"creation":[66],"nonce":[68],"secret,":[70],"encryption":[71],"decryption,":[73],"addition":[74],"attribute":[76],"set,":[77],"message":[78],"sending":[79],"receiving.":[81],"These":[82],"primitives":[83],"can":[84,126,146],"specified":[86],"according":[87,93,118],"various":[89],"requirements.":[91],"Secondly,":[92],"five":[96],"kinds":[97],"rules,":[100],"construct":[102],"modules":[104,133],"identity":[106],"authentication,":[107],"secrecy,":[109],"integrity,":[111],"non-repudiation":[112],"user":[114],"privacy.":[115],"At":[116],"last,":[117],"requirements":[121],"computing,":[124],"obtain":[127],"verify":[131],"with":[134,162],"composition":[135],"rules.":[136],"In":[137],"application":[139],"field":[140],"goals":[145],"realized,":[148],"even":[149],"multiple":[151],"interactions":[152],"between":[153],"different":[154],"pairs":[155],"users":[157],"service":[159],"providers.":[160],"Compared":[161],"manual":[163],"method":[164],"from":[165],"efficiency,":[168],"provides":[172],"more":[174],"convenient":[175],"secure":[177],"way":[178],"design.":[182]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
