The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the...The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the method, applicable neural network structure, neural network construc ting, input standardization, training sample constructing, and the procedure of evaluating trust degree of Web services with trained neural network are described. Experiments show that it is feasible and effective to evaluate trust degree of Web Service with neural network.展开更多
The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to ...The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks.展开更多
At the present stage, The imported grape wine in China have hot market, imports increased year by year, high gross mar-gins, many brands, uneven quality, low market confidence, the price value of large deviations, imp...At the present stage, The imported grape wine in China have hot market, imports increased year by year, high gross mar-gins, many brands, uneven quality, low market confidence, the price value of large deviations, imperfect legislation, regulatory confusion and so on characters. The relevant departments and units should actively take a number of measures to improve the market of imported grape wine stably and healthy development. Believe in the future, its imports would continue to grow, the gross profit margin gradually would return to rational, the cost-effective products would be prevailing, the sales channels would be diversification, the enterprises in-volved would increase, and the industry competition would become increasingly fierce.展开更多
Based on trust measurement, a new cross-domain access control model is proposed to improve the security performance of the cross-domain access control processes. This model integrates the trust management and trusted ...Based on trust measurement, a new cross-domain access control model is proposed to improve the security performance of the cross-domain access control processes. This model integrates the trust management and trusted platform measurement, defines several concepts (user trust degree, platform configuration integrity and intra/inter-domain trust degree) and calculates them with users' uniform identity authentication and historical access behavior analysis. Then this model expands the extensible access control markup language (XACML) model by adding inside trust manager point (ITMP) and outside trust manager point (OTMP), and describes the architectures and workflows of ITMP and OTMP in details. The experimental results show that this model can achieve more fine-grained access control, implement dynamic authorization in a simple way, and improve the security degrees of the cross-domain access control.展开更多
In the mobile crowd sensing(MCS)network environment,it is very important to establish an evolutionary process that can dynamically depict the trust degree of task participants.To address this issue,this paper proposes...In the mobile crowd sensing(MCS)network environment,it is very important to establish an evolutionary process that can dynamically depict the trust degree of task participants.To address this issue,this paper proposes a dynamic trust evaluation model for task participants.Firstly,according to the security requirements and trust strategy of the perceived tasks,the attribute reduction algorithm(ARA)based on rough set is used to obtain the multi-attribute indexes that affect the participants’trust information.Removing the redundant attributes can avoid the lag of trust evaluation and reduce the time cost.Secondly,the grey correlation analysis method is used to solve the correlation degree between the target sequence and the comparison sequence on the trust attributes by integrating the multi-attribute decision-making method,which avoids the distortion of the trust evaluation caused by human subjective factors and improves the quality of the perceived data.Finally,a dynamic trust evaluation model for participants in complex sensing network environment is established.The simulation results show that the proposed model can not only dynamically depict the trust degree of participants in real time,but also have higher accuracy and less time cost.展开更多
基金Supported by the National Natural Science Foun-dation of China(60403027)the Natural Science Foundation of HubeiProvince (2005ABA258) the Open Foundation of State Key Labora-tory of Software Engineering(SKLSE05-07)
文摘The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the method, applicable neural network structure, neural network construc ting, input standardization, training sample constructing, and the procedure of evaluating trust degree of Web services with trained neural network are described. Experiments show that it is feasible and effective to evaluate trust degree of Web Service with neural network.
文摘The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks.
文摘At the present stage, The imported grape wine in China have hot market, imports increased year by year, high gross mar-gins, many brands, uneven quality, low market confidence, the price value of large deviations, imperfect legislation, regulatory confusion and so on characters. The relevant departments and units should actively take a number of measures to improve the market of imported grape wine stably and healthy development. Believe in the future, its imports would continue to grow, the gross profit margin gradually would return to rational, the cost-effective products would be prevailing, the sales channels would be diversification, the enterprises in-volved would increase, and the industry competition would become increasingly fierce.
基金Supported by the National Key Technology Support Program of China(2013BAK07B04)the Natural Science Foundation of Hebei Province(F2014201152)
文摘Based on trust measurement, a new cross-domain access control model is proposed to improve the security performance of the cross-domain access control processes. This model integrates the trust management and trusted platform measurement, defines several concepts (user trust degree, platform configuration integrity and intra/inter-domain trust degree) and calculates them with users' uniform identity authentication and historical access behavior analysis. Then this model expands the extensible access control markup language (XACML) model by adding inside trust manager point (ITMP) and outside trust manager point (OTMP), and describes the architectures and workflows of ITMP and OTMP in details. The experimental results show that this model can achieve more fine-grained access control, implement dynamic authorization in a simple way, and improve the security degrees of the cross-domain access control.
基金supported by National Natural Science Foundation of China(6120245861403109)+1 种基金Natural Science Foundation of Heilongjiang Province of China(F2017021)Harbin Science and Technology Innovation Research Funds(2016RAQXJ036)。
文摘In the mobile crowd sensing(MCS)network environment,it is very important to establish an evolutionary process that can dynamically depict the trust degree of task participants.To address this issue,this paper proposes a dynamic trust evaluation model for task participants.Firstly,according to the security requirements and trust strategy of the perceived tasks,the attribute reduction algorithm(ARA)based on rough set is used to obtain the multi-attribute indexes that affect the participants’trust information.Removing the redundant attributes can avoid the lag of trust evaluation and reduce the time cost.Secondly,the grey correlation analysis method is used to solve the correlation degree between the target sequence and the comparison sequence on the trust attributes by integrating the multi-attribute decision-making method,which avoids the distortion of the trust evaluation caused by human subjective factors and improves the quality of the perceived data.Finally,a dynamic trust evaluation model for participants in complex sensing network environment is established.The simulation results show that the proposed model can not only dynamically depict the trust degree of participants in real time,but also have higher accuracy and less time cost.