Abstract

The network in information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their developments. The intelligent solution to information security is a self-organized management and computing security protocol that is completed through the intelligent technologies at both ends of the sensing device and network authentication center. The results show that the network security information communication and publicity management platform built by the self-organized network management and computing of the intelligent solutions to information security can effectively heighten network users’ awareness of information protection, enhance the security of network environment, and promote the improvement of scientific network security rules. The study results of this paper provide a reference for further researches on self-organized network management and computing of intelligent solutions to information security.

Highlights

  • The information age has arrived, and network has become an important part of life

  • The network in the information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have become a significant obstacle to their development

  • The results show that the network security information communication and publicity management platform built by the selforganized network management and computing of the intelligent solutions to information security can effectively heighten network user awareness of information protection, enhance the security of network environment, and promote the improvement of scientific network security rules

Read more

Summary

INTRODUCTION

The information age has arrived, and network has become an important part of life. in the process of in-depth application of computers and networks, information security issues have become a significant obstacle to their developments. Encryption, decryption and authentication mechanisms are used to ensure message security and the realization of network security mainly relies on computer information management technology. The study results of this paper provide a reference for further researches on self-organized network management and computing of intelligent solutions to information security. The detailed chapters are arranged as follows: Section 2 introduces the methods and principles of the network trust model and security reasoning mechanism; Section 3 constructs the self-organized network management structure and scheme for the intelligent solutions to information security; Section 4 proposes the self-organized network computing approach and framework for the intelligent solutions to information security; Section 5 conducts a simulation experiment and its result analysis; Section 6 is conclusion

METHODS AND PRINCIPLES
Safety Reasoning Mechanism
Self-Organized Network Management Structure
Computing Recommended Approach
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.