{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T05:05:30Z","timestamp":1734239130057,"version":"3.30.2"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.23919\/ituk62727.2024.10772950","type":"proceedings-article","created":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T18:48:12Z","timestamp":1734115692000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Computing Force Network Security: Risks, Protection Requirements and Scenarios"],"prefix":"10.23919","author":[{"given":"Sun","family":"Hongju","sequence":"first","affiliation":[{"name":"China Mobile Communications Group Co., Ltd,China"}]},{"given":"Qiu","family":"Qin","sequence":"additional","affiliation":[{"name":"China Mobile Communications Group Co., Ltd,China"}]},{"given":"Xu","family":"Jiawei","sequence":"additional","affiliation":[{"name":"China Mobile Communications Group Co., Ltd,China"}]},{"given":"Xu","family":"Tianni","sequence":"additional","affiliation":[{"name":"China Mobile Communications Group Co., Ltd,China"}]},{"given":"Xu","family":"Sijia","sequence":"additional","affiliation":[{"name":"China Mobile Communications Group Co., Ltd,China"}]},{"given":"Zhang","family":"Feng","sequence":"additional","affiliation":[{"name":"China Mobile Communications Group Co., Ltd,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSS55994.2022.00029"},{"volume-title":"Computing power network - Framework and architecture","year":"2021","key":"ref2"},{"issue":"4","key":"ref3","first-page":"340","article-title":"Computing force network security architecture and data security governance technology","volume":"8","author":"Qiu","year":"2022","journal-title":"Journal of Information Security Research"},{"key":"ref4","first-page":"109","article-title":"Research on the security architecture of artificial intelligence computing power infrastructure","volume":"10","author":"Liu","year":"2024","journal-title":"Research on Information Security"},{"key":"ref5","first-page":"12","article-title":"Research on computing power network security and data security governance technology","volume":"37","author":"Zhu","year":"2024","journal-title":"Telecommunications Engineering Technology and Standardization"},{"issue":"2","key":"ref6","first-page":"82","article-title":"Research on security system for computing power networks","volume":"49","author":"Yuan","year":"2023","journal-title":"Information and Communication Technology and Policy"},{"article-title":"A user identity credibility evaluation method based on user behavior in cloud environment","year":"2021","author":"Jiang","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft57336.2023.10175478"},{"issue":"12","key":"ref9","first-page":"2372","article-title":"Active defense method for computing power networks based on deep reinforcement learning","author":"Zhang","year":"2023","journal-title":"Chinese Science: Information Science"},{"issue":"10","key":"ref10","first-page":"38","article-title":"Privacy protection scheme of transcation data supporting zero-knowledge proof","author":"Qin","year":"2022","journal-title":"Information Security and Communications Privacy"},{"issue":"3","key":"ref11","first-page":"13","article-title":"Security architecture and key technologies for computing network resource management","volume":"17","author":"Gao","year":"2023","journal-title":"Information and communication technology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/UPCON59197.2023.10434361"},{"key":"ref13","first-page":"22","article-title":"The application of mfa multi-factor unified identity authentication platform based on zero trust architecture","author":"Feng","year":"2024","journal-title":"Network Security Technology and Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357395"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW49093.2021.9420028"},{"issue":"6","key":"ref16","first-page":"66","article-title":"Research and practical analysis of security resource pool security component service orchestration","volume-title":"Information security and communication confidentiality","author":"Cheng"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107873"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC48278.2020.9217122"},{"issue":"6","key":"ref19","first-page":"35","article-title":"Ensuring privacy and security, promoting data circulation - a review of the development trends of privacy computing application technology","author":"He","year":"2023","journal-title":"Artificial Intelligence"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110049"}],"event":{"name":"2024 ITU Kaleidoscope: Innovation and Digital Transformation for a Sustainable World (ITU K)","start":{"date-parts":[[2024,10,21]]},"location":"New Delhi, India","end":{"date-parts":[[2024,10,23]]}},"container-title":["2024 ITU Kaleidoscope: Innovation and Digital Transformation for a Sustainable World (ITU K)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10772729\/10772741\/10772950.pdf?arnumber=10772950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T06:45:09Z","timestamp":1734158709000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10772950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/ituk62727.2024.10772950","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]}}}