{"title":"基于人工智能语义网络的电力信息系统自动访问控制模型","authors":"Ying Zhang","doi":"10.4018/ijdst.308003","DOIUrl":null,"url":null,"abstract":"In order to solve the requirements of scheduling automation system for access control and the defects of access control model, an automatic access control model of power information system based on intelligent semantic network was designed. The overall structure of access control model of power information system is given. The detector is designed by artificial intelligence technology, combining artificial neural network and artificial immune algorithm, which provides the basis for checking access request module. By checking the access request module to find out whether there is a detector matching the access request, to judge whether the access request is legitimate. The verification results show that, the model can effectively support the access and modification of legitimate users and prevent the access of illegal users with high control precision.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"68 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network\",\"authors\":\"Ying Zhang\",\"doi\":\"10.4018/ijdst.308003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to solve the requirements of scheduling automation system for access control and the defects of access control model, an automatic access control model of power information system based on intelligent semantic network was designed. The overall structure of access control model of power information system is given. The detector is designed by artificial intelligence technology, combining artificial neural network and artificial immune algorithm, which provides the basis for checking access request module. By checking the access request module to find out whether there is a detector matching the access request, to judge whether the access request is legitimate. The verification results show that, the model can effectively support the access and modification of legitimate users and prevent the access of illegal users with high control precision.\",\"PeriodicalId\":118536,\"journal\":{\"name\":\"Int. J. Distributed Syst. Technol.\",\"volume\":\"68 6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Distributed Syst. Technol.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijdst.308003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Distributed Syst. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijdst.308003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network
In order to solve the requirements of scheduling automation system for access control and the defects of access control model, an automatic access control model of power information system based on intelligent semantic network was designed. The overall structure of access control model of power information system is given. The detector is designed by artificial intelligence technology, combining artificial neural network and artificial immune algorithm, which provides the basis for checking access request module. By checking the access request module to find out whether there is a detector matching the access request, to judge whether the access request is legitimate. The verification results show that, the model can effectively support the access and modification of legitimate users and prevent the access of illegal users with high control precision.