期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
1
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
下载PDF
Password Pattern and Vulnerability Analysis for Web and Mobile Applications 被引量:1
2
作者 LI Shancang Imed Romdhani William Buchanan 《ZTE Communications》 2016年第B06期32-36,共5页
Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Sh... Text-based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy and Minimum entropy. We show how to substantially improve upon the strength of passwords based on the analysis of text-password entropies. By analyzing the passwords datasets of Rockyou and 163.com, we believe strong password can be designed based on good usability, deployability, rememberbility, and security entropies. 展开更多
关键词 password strength security entropies password vulnerabilities
下载PDF
A purely data driven method for European option valuation 被引量:1
3
作者 黄光辉 《Journal of Chongqing University》 CAS 2006年第3期175-180,共6页
An alternative option pricing method is proposed based on a random walk market model. The minimal entropy martingale measure which adopts no arbitrage opportunity in the market, is deduced for this market model and is... An alternative option pricing method is proposed based on a random walk market model. The minimal entropy martingale measure which adopts no arbitrage opportunity in the market, is deduced for this market model and is used as the pricing measure to evaluate European call options by a Monte Carlo simulation method. The proposed method is a purely data driven valuation method without any distributional assumption about the price process of underlying asset. The performance of the proposed method is compared with the canonical valuation method and the historical volatility-based Black-Scholes method in an artificial Black-Scholes world. The simulation results show that the proposed method has merits, and is valuable to financial engineering. 展开更多
关键词 derivative security minimal entropy martingale measure Monte Carlo simulation
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部