Nowadays, smart home technology is still in continuous development; more and more enterprises and organizations began to enter this industry. However, the security problems and the unknown of emerging technologies make that most people are still in the wait-and-see stage for smart home systems. Under the background that many enterprises have different opinions on the security of smart home systems, this study is committed to forming a set of general evaluation standard index system. The main research work of this paper: the influencing factors of smart home system security are analyzed; according to the characteristics of smart home system equipment, the system security is divided into four aspects: control system, communication technology, intelligent products and cloud services; based on the current national standards, combined with the safety standards of various organizations, safety indicators are selected for each aspect. Finally, the established smart home system security evaluation index system enables users to have a set of relatively general evaluation methods among many different standards to compare and consider the current smart home system with various brands. It is helpful for users to try or further understand the smart home industry to promote the development and progress of the smart home industry.
Block chain technology has occupied a very important position in today's society. This emerging technology has been successfully explored and developed in many fields and scenarios. However, due to the fact that block chain technology is still in the exploratory stage, there is no rigid specification and index for block chain products, Integrating the research results of block chain technology architecture and security risk assessment, this paper designs a set of evaluation indicators for block chain products. The indicators are divided into six aspects, including P2P network technology evaluation index, distributed ledger technology evaluation index, asymmetric encryption technology evaluation index, smart contract evaluation index, consensus mechanism evaluation index and other security technologies Evaluation indicators, each big evaluation index is subdivided into several more in-depth evaluation indicators, and each of the specific analysis and explanation. Finally, based on the previous analysis and design work, a block chain product evaluation software is developed, which provides users with the function of comprehensive evaluation of block chain products. The design and software implementation of the block chain product evaluation system can effectively improve the efficiency in the development of block chain products and the quality of the products themselves, which is conducive to the further development of the block chain field.
The connotation of professional certification of engineering education is that a professional certification evaluation organization conducts a comprehensive evaluation of engineering professional disciplines set up by educational institutions. The entire evaluation process consists of specialized occupations, industry associations, industry federations, professional societies and education in this field. Experts and enterprise experts in related industries work together to ensure that these engineering professionals have sufficient professional qualities and abilities when entering the real industrial social environment. At present, the whole process of engineering education professional certification in China mainly relies on manual audit applications. In order to realize the interconnection between applicants and evaluators, an engineering education professional certification and evaluation system is needed. Through this platform, the docking between universities and evaluation expert groups can be realized, and the evaluation results can be visualized. This paper is a part of the basic work of the evaluation system. Its main work is: using data analysis and expert method to analyze the general standard of engineering education professional certification; By using data analysis and expert method, this paper analyzes some relevant standards of Engineering Education Accreditation in China; The specific indicators of the engineering education accreditation evaluation system are screened out by using the expert method; According to the whole process of evaluation and certification, combined with the characteristics of other evaluation systems, the index system of evaluation system is designed; Completed the functional and non functional analysis of the evaluation system. These works lay a solid foundation for the design and implementation of the subsequent engineering education accreditation evaluation system.
Blockchain is now widely used in various industries due to its openness, transparency, autonomy, imtamability, decentralization, and traceability. With the wide application of blockchain technology, its security problems have also brought significant challenges, seriously affecting the implementation of blockchain applications. Data on the traditional blockchain is open to the entire network node. The update operation of data records is also transparent, accompanied by the leakage of user information. Although blockchain has the characteristics of anonymity and privacy, with its development, it has not been easy to meet users' needs. How to effectively protect user data privacy, realize data sharing on the blockchain, and ensure the security of data integrity, transmission efficiency, storage efficiency, and application is very important to break through the bottleneck of the development of blockchain technology and promote its application. This paper proposes a traffic data resource access control scheme based on blockchain technology by combining the attribute encryption access control system based on ciphertext strategy based on blockchain's distributed ledger technology and the openness and imtamability it brings. In this scheme, the task of attribute encryption is to ensure the security involved in the process of plaintext and ciphertext conversion and the efficiency of data sharing, and to implement a one-to-many access sharing policy, to enhance the safety of the access sharing system and improve the efficiency of the access control module. This paper introduces the access control mechanism from two aspects of system architecture and the access sharing process. Then the attribute encryption mechanism is designed. The design process includes symbol description, primary structure, algorithm design idea and algorithm construction. Finally, the functionality and security of the access control mechanism are analysed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.