期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A time sequence analysis on the informal information flow mechanism of microblogging
1
作者 Yuan HU Xiaoli LIAO Andong WU 《Chinese Journal of Library and Information Science》 2011年第Z1期68-81,共14页
Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study... Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study, through using the natural language processing(NLP) and data mining, we analyzed the information content transmitted via a microblog, users' social networks and their interactions, and carried out an empirical analysis on the dissemination process of one particular piece of information via Sina Weibo.Based on the result of these analyses, we attempt to develop a better understanding about the rule and mechanism of the informal information flow in microblogging. 展开更多
关键词 Microblog information flow model Social network information dissemination
下载PDF
Analysis and Application for Integrity Model on Trusted Platform
2
作者 TUGuo-qing ZHANGHuan-guo WANGLi-na YUDan-dan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期35-38,共4页
To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with inf... To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model, we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model, once the trust chain is created andmanaged cor-rectly, the integrity of the computer'shardware and sofware has bctn maintained, so does the confidentiality and authenticity. Moreover, arelevant implementation of the model is explained. 展开更多
关键词 tiusted computing access control model information flow model trust chain INTEGRITY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部