[1]姜琳, 周亮, 缪思薇, 等. 基于零信任架构的电力物联网安全接入方法[J]. 电力信息与通信技术, 2023, 21(1): 4046[2]刘涛, 马越, 姜和芳, 等. 基于零信任的电网安全防护架构研究[J]. 电力信息与通信技术, 2021, 19(7): 2532[3]孙瑞. 基于行为建模的智能终端用户身份识别的关键技术研究与实现[D]. 南京: 南京邮电大学, 2021[4]黄强. 基于设备指纹和行为可信的物联网访问控制系统[D]. 南京: 东南大学, 2019.[5]Zhang G P, Tian J Z. An extended role based access control model for the Internet of things[C] Proc of 2010 Int Conf on Information (ICINA 2010). Piscataway, NJ: IEEE, 2010: 13191323[6]王伟迪, 陈珂, 胡天磊, 等.一种单词移动距离度量下的文档查询方法研究[J]. 计算机科学与探索, 2018, 12(11): 17181728[7]周阳. 基于SDN的网络安全防御关键技术研究[D]. 北京: 北京邮电大学, 2018[8]Song L H, Zhu Z K, Li M C, et al. A novel access control for Internet of things based on blockchain smart contract[C] Proc of the 5th IEEE Advanced Information Technology, Electronic and Automation Control Conf. Chongqing: Chengdu Union Institute of Science and Technology, 2021: 111117[9]Cheng X H, Hu M, Wang T, et al. Research on trustbased access control in the Internet of things[J]. International Journal of Security and its Applications, 2016, 10(12): 283288[10]Chen Z G, Tian L Q. Privacypreserving model of IoT based trust evaluation[J]. The Institute of Electronics, Information and Communication Engineers, 2017, E100.D(2): 371374[11]Xu R H, Chen Y, Blasch E, et al. BlendCAC: A smart contract enabled decentralized capabilitybased access control mechanism for the IoT[J]. Computers, 2018, 7(3): 39 |