期刊文献+
共找到5,287篇文章
< 1 2 250 >
每页显示 20 50 100
Can whole steps of grain production be outsourced? Empirical analysis based on the three provinces of Jiangsu,Jilin,and Sichuan in China
1
作者 Jiacheng Liu Shengzhi Mao +1 位作者 Qiufen Zheng Zhigang Xu 《Journal of Integrative Agriculture》 SCIE CSCD 2024年第1期336-347,共12页
Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services obs... Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services observed in harvesting,land preparation,and sowing.This study examines the feasibility of implementing whole-step outsourcing in grain production by conducting a case study of rice and maize production in Jiangsu,Jilin,and Sichuan provinces in China.The provision of outsourcing services hinges on two essential conditions:technological advancements fostering specialized production and economies of scale,coupled with a market size sufficient to realize the aforementioned potential economies of scale.The results showed that outsourcing pest control or harvesting services had varying economies of scale.The outsourcing services in pest control were less common than in harvesting services,and their marginal growth space of the economies of scale with technological change was also smaller.Determined by the operational characteristics of pest control itself,the market scale of its professional services is small.Therefore,achieving the whole-step outsourcing of grain production necessitates not only technological innovation but also effective policy interventions to overcome the constraints of market scale.Such interventions include(1)optimizing crop layouts between planning regions and reducing land fragmentation and(2)supplying timely and effective inter-regional agricultural information for service providers aided by information technology. 展开更多
关键词 outsourcing services economy of scale technical conditions market scale
下载PDF
Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption
2
作者 Chen Wang Jian Xu +2 位作者 Jiarun Li Yan Dong Nitin Naik 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1421-1436,共16页
Outsourcing the k-Nearest Neighbor(kNN)classifier to the cloud is useful,yet it will lead to serious privacy leakage due to sensitive outsourced data and models.In this paper,we design,implement and evaluate a new sys... Outsourcing the k-Nearest Neighbor(kNN)classifier to the cloud is useful,yet it will lead to serious privacy leakage due to sensitive outsourced data and models.In this paper,we design,implement and evaluate a new system employing an outsourced privacy-preserving kNN Classifier Model based on Multi-Key Homomorphic Encryption(kNNCM-MKHE).We firstly propose a security protocol based on Multi-key Brakerski-Gentry-Vaikuntanathan(BGV)for collaborative evaluation of the kNN classifier provided by multiple model owners.Analyze the operations of kNN and extract basic operations,such as addition,multiplication,and comparison.It supports the computation of encrypted data with different public keys.At the same time,we further design a new scheme that outsources evaluation works to a third-party evaluator who should not have access to the models and data.In the evaluation process,each model owner encrypts the model and uploads the encrypted models to the evaluator.After receiving encrypted the kNN classifier and the user’s inputs,the evaluator calculated the aggregated results.The evaluator will perform a secure computing protocol to aggregate the number of each class label.Then,it sends the class labels with their associated counts to the user.Each model owner and user encrypt the result together.No information will be disclosed to the evaluator.The experimental results show that our new system can securely allow multiple model owners to delegate the evaluation of kNN classifier. 展开更多
关键词 outsourced privacy-preserving multi-key HE machine learning KNN
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
3
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
4
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
Research on the Status Quo and Countermeasures of Human Resource Management Outsourcing in China’s Pharmaceutical Enterprises
5
作者 Wang Jianing Wang Shuling 《Asian Journal of Social Pharmacy》 2024年第1期64-71,共8页
Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current sit... Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current situation of human resource management outsourcing in China’s pharmaceutical enterprises was analyzed through the method of literature research.Results and Conclusion At present,the status of human resource management outsourcing in China’s pharmaceutical companies is that the level of human resource outsourcing companies is not high,and there are no relevant industry norms and laws.The information asymmetry between pharmaceutical enterprises and outsourcing companies results in adverse selection and moral hazard.Besides,the different culture of pharmaceutical enterprises and outsourcing companies leads to inefficient communication between enterprises and employee.To solve these problems,the government should promote and improve industry norms and laws to regulate the market.In addition,enterprises should clarify the motivation for outsourcing and make good decision on the outsourcing content.Meanwhile,enterprises should strengthen communication with employees to eliminate employees’concerns. 展开更多
关键词 pharmaceutical enterprise human resource management outsourcing countermeasure research
下载PDF
A secure outsourced Turing- equivalent computation scheme against semi-honest workers using fully homomorphic encryption
6
作者 方昊 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期267-271,共5页
A scheme that can realize homomorphic Turing- equivalent privacy-preserving computations is proposed, where the encoding of the Turing machine is independent of its inputs and running time. Several extended private in... A scheme that can realize homomorphic Turing- equivalent privacy-preserving computations is proposed, where the encoding of the Turing machine is independent of its inputs and running time. Several extended private information retrieval protocols based on fully homomorphic encryption are designed, so that the reading and writing of the tape of the Turing machine, as well as the evaluation of the transition function of the Turing machine, can be performed by the permitted Boolean circuits of fully homomorphic encryption schemes. This scheme overwhelms the Turing-machine-to- circuit conversion approach, which also implements the Turing-equivalent computation. The encoding of a Turing- machine-to-circuit conversion approach is dependent on both the input data and the worst-case runtime. The proposed scheme efficiently provides the confidentiality of both program and data of the delegator in the delegator-worker model of outsourced computation against semi-honest workers. 展开更多
关键词 Turing machine fully homomorphic encryption outsourced computation
下载PDF
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
7
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
下载PDF
A Scheme for Verifying the Integrity of Outsourced Data
8
作者 WANG Xiaoming YU Fang +2 位作者 LIN Yanchun GAN Qingqing WU Daini 《China Communications》 SCIE CSCD 2015年第11期188-195,共8页
Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this ... Unauthorized tampering with outsourced data can result in significant losses for both data owner and users.Data integrity therefore becomes an important factor in outsourced data systems.In this paper,we address this problem and propose a scheme for verifying the integrity of outsourced data.We first propose a new authenticated data structure for authenticating membership queries in sets based on accumulators,and then show how to apply it to the problem of verifying the integrity of outsourced data.We also prove that our scheme is secure under the q-strong DiffieHellman assumption.More importantly,our scheme has the constant cost communication,meanwhile keeping other complexity measures constant.Compared to previous schemes based on accumulators,our scheme reduces update cost and so improves previous schemes based on accumulators.In addition,the experimental comparison shows that our scheme outperforms the previous schemes. 展开更多
关键词 outsourced DATA authenticated datastructure DATA INTEGRITY CONSTANT COMPLEXITY
下载PDF
(r,QI)-Transform:Reversible Data Anonymity Based on Numeric Type of Data in Outsourced Database
9
作者 Iuon-Chang Lin Yang-Te Lee Chen-Yang Cheng 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期222-230,共9页
An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capa... An outsource database is a database service provided by cloud computing companies.Using the outsource database can reduce the hardware and software's cost and also get more efficient and reliable data processing capacity.However,the outsource database still has some challenges.If the service provider does not have sufficient confidence,there is the possibility of data leakage.The data may has user's privacy,so data leakage may cause data privacy leak.Based on this factor,to protect the privacy of data in the outsource database becomes very important.In the past,scholars have proposed k-anonymity to protect data privacy in the database.It lets data become anonymous to avoid data privacy leak.But k-anonymity has some problems,it is irreversible,and easier to be attacked by homogeneity attack and background knowledge attack.Later on,scholars have proposed some studies to solve homogeneity attack and background knowledge attack.But their studies still cannot recover back to the original data.In this paper,we propose a data anonymity method.It can be reversible and also prevent those two attacks.Our study is based on the proposed r-transform.It can be used on the numeric type of attributes in the outsource database.In the experiment,we discussed the time required to anonymize and recover data.Furthermore,we investigated the defense against homogeneous attack and background knowledge attack.At the end,we summarized the proposed method and future researches. 展开更多
关键词 Index Terms--Cloud database data anonymity database privacy outsource database REVERSIBLE
下载PDF
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
10
作者 Atif Ikram Masita Abdul Jalil +3 位作者 Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan 《Computers, Materials & Continua》 SCIE EI 2023年第3期5035-5048,共14页
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most... The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development only.Several frameworks have been developed focusing on guiding software systemmanagers concerning offshore software outsourcing.However,none of these studies delivered comprehensive guidelines for managing the whole process of OSMO.There is a considerable lack of research working on managing OSMO from a vendor’s perspective.Therefore,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s perspective.This study validated the preliminary OSMO process model via a case study research approach.The results showed that the OSMO process model is applicable in an industrial setting with few changes.The industrial data collected during the case study enabled this paper to extend the preliminary OSMO process model.The refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk. 展开更多
关键词 Offshore outsourcing process model model validation vendor challenges case study
下载PDF
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
11
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2023年第1期1871-1886,共16页
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different w... Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and value.One of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’projects.The goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO clients.The projects belong to OSMO vendors,having offices in developing countries while providing services to developed countries.In the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed model.The proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden layers.The results express that the suggested model has gained a notable recognition rate in comparison to any previous studies.The current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment. 展开更多
关键词 Software outsourcing deep extreme learning machine(DELM) machine learning(ML) extreme learning machine ASSESSMENT
下载PDF
On Incentive and Coordination Mechanism of Service Outsourcing Based on Principal-Agent Theory and Blockchain Technology
12
作者 Chenglong Yan Xiao Wang +1 位作者 Xiaonan Zhang Ruzhi Xu 《Journal of Artificial Intelligence and Technology》 2023年第1期1-9,共9页
To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-... To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-agent framework,examines the dynamic game situation before the contract being signed,and develops four information models.The analysis reveals a Pareto improvement in the game’s Nash equilibrium when comparing the four models from the standpoint of the supply chain.In the complete information scenario,the service level of the service provider,the customer company’s incentive effectiveness,and the supply chain system’s ultimate profit are all maximized.Furthermore,a coordinating mechanism for disposable profit is built in this study.The paper then suggests a blockchain-based architecture for the service outsourcing process supervision and a distributed incentive mechanism under the coordination mechanism in response to the inadequacy of the principal-agent theory to address the information asymmetry problem and the moral hazard problem.The experiment’s end findings demonstrate that both parties can benefit from the coordination mechanism,and the application of blockchain technology can resolve these issues and effectively encourage service providers. 展开更多
关键词 service outsourcing coordination mechanism distributed incentive mechanism blockchain
下载PDF
图书馆智慧管理平台书目数据融合若干问题分析——以河海大学图书馆为例 被引量:1
13
作者 高冕 高培培 王鹏 《江苏科技信息》 2024年第2期65-69,共5页
文章通过分析河海大学图书馆智慧管理平台下的书目数据融合项目的实践,总结了数据库中书目数据存在的问题及原因,从编目人员、编目外包公司、图书馆自身3个维度提出优化策略,以提升图书馆的编目业务的质量,促进图书馆编目事业稳定健康... 文章通过分析河海大学图书馆智慧管理平台下的书目数据融合项目的实践,总结了数据库中书目数据存在的问题及原因,从编目人员、编目外包公司、图书馆自身3个维度提出优化策略,以提升图书馆的编目业务的质量,促进图书馆编目事业稳定健康的发展。 展开更多
关键词 书目数据 数据融合 编目外包 质量控制 高校图书馆
下载PDF
贸易自由化、企业生产网络与绿色贸易
14
作者 孙瑾 汪俊波 张礼卿 《经济科学》 北大核心 2024年第2期5-27,共23页
本文研究了在具有企业间生产网络的背景下,贸易自由化对绿色贸易的影响规模及机制。本文采用HITS算法创新地构建了中国企业的生产网络中心度指标数据,建立了包含中间品进口、最终品出口和污染排放的生产网络理论模型,并进行理论与实证... 本文研究了在具有企业间生产网络的背景下,贸易自由化对绿色贸易的影响规模及机制。本文采用HITS算法创新地构建了中国企业的生产网络中心度指标数据,建立了包含中间品进口、最终品出口和污染排放的生产网络理论模型,并进行理论与实证分析。研究发现:贸易自由化有利于企业降低出口排放强度,实现绿色贸易的发展,并且该促进作用随着企业网络中心度的上升而不断增强,主要影响渠道来自规模效应、结构效应和技术效应。区分行业上游度来看,处于最上游位置行业的生产网络调节作用不明显,处于最下游位置行业的网络中心度对出口贸易自由化的调节作用较为显著,而居中行业的网络中心度对进口中间品贸易自由化的调节作用较为显著,区分地区来看,生产网络的调节作用对东部企业显著,而对中西部企业不显著. 展开更多
关键词 企业生产网络 贸易自由化 绿色贸易 出口排放强度
下载PDF
面向云存储的属性基双边访问控制方案
15
作者 李琦 樊昊源 +3 位作者 陈伟 熊金波 韩立东 李瑞 《通信学报》 EI CSCD 北大核心 2024年第4期128-136,共9页
针对目前云存储中细粒度双边访问控制机制安全模型较弱且外包解密结果缺乏验证的问题,提出了一种面向云存储数据的属性基双边访问控制方案。首先,提出了自适应安全可验证外包双边CP-ABE的形式化定义和安全模型;其次,以此为基础并结合批... 针对目前云存储中细粒度双边访问控制机制安全模型较弱且外包解密结果缺乏验证的问题,提出了一种面向云存储数据的属性基双边访问控制方案。首先,提出了自适应安全可验证外包双边CP-ABE的形式化定义和安全模型;其次,以此为基础并结合批量可验证技术在合数阶群上设计了双边访问控制方案,支持数据拥有者与数据使用者同时为对方定义访问策略;最后,安全性分析表明,所提方案在自适应安全模型下针对选择明文攻击与选择消息攻击是不可区分的和存在性不可伪造的。实验结果显示,所提方案减轻了用户端的匹配、解密以及验证阶段的计算开销。 展开更多
关键词 云存储 双边访问控制 自适应安全 批量可验证 外包解密
下载PDF
基于区块链高效安全的多部门铁路工程数据访问控制策略
16
作者 郑云水 刘恒江 董昱 《铁道科学与工程学报》 EI CAS CSCD 北大核心 2024年第6期2488-2498,共11页
针对铁路工程建设中各参建部门之间的数据资源,具有共享效率差、利用率低和安全程度不高的问题,提出一种基于区块链(Blockchain)铁路工程数据的共享及安全存储方案来弥补现有的铁路工程数据平台的不足。在工程建设平台中,引入了基于外... 针对铁路工程建设中各参建部门之间的数据资源,具有共享效率差、利用率低和安全程度不高的问题,提出一种基于区块链(Blockchain)铁路工程数据的共享及安全存储方案来弥补现有的铁路工程数据平台的不足。在工程建设平台中,引入了基于外包的属性加密技术(Outsourcing-Attribute Based Encryption technology, OABE)、区块链技术和星际文件系统(Interplanetary File System, IPFS)以及边缘节点(Edge Nodes, EN),并提出一种适用于铁路工程建设的多部门区块链与IPFS的协作网络。研究结果表明:当施工现场资源设备有限时,相比于较为传统基于云辅助的密文策略属性基加密技术(Ciphertext Policy Attribute Based Encryption, CP-ABE),通过将铁路工程数据外包给边缘节点,可以更好地为资源受限设备提供大量的计算,减轻设备的计算负担,确保了数据的安全性并且提高了设备的计算效率。而且将铁路工程数据存储在星际文件系统上,避免集中式的服务器机制在故障时造成数据的丢失和泄露。此外,通过使用区块链网络可以提高参建单位之间的数据资源共享效率,增强了数据的利用率,利用区块链的共识性来实现每个参建单位之间数据的一致性,确保了不同参建单位间的信任度。经过安全性证明,采用基于双线性迪菲赫尔曼指数假设(Decision q-Bilinear Diffie Hellman Exponent Assumption, q-BDHE)下具有不可区分性是安全的。实验结果表明,该策略在本地用户计算时间效率上与现有的带关键字搜索的外包属性基加密方案以及属性基加密的方案相比是最优的,可以很好地减轻现场设备的计算负担。 展开更多
关键词 铁路工程数据 区块链 关键字搜索 外包属性基加密 安全性
下载PDF
正确性可验证的密文图数据最短路径外包计算方案
17
作者 丁红发 于莹莹 蒋合领 《计算机科学》 CSCD 北大核心 2024年第5期400-413,共14页
地理位置、社交网络等海量图数据应用广泛且包含大量隐私,通常需要安全的外包计算来提供多样化的查询服务。然而,如何设计正确性可验证的图数据外包计算协议仍是公开的难题。为此,提出了加密图数据上正确性可验证的精确最短路径外包计... 地理位置、社交网络等海量图数据应用广泛且包含大量隐私,通常需要安全的外包计算来提供多样化的查询服务。然而,如何设计正确性可验证的图数据外包计算协议仍是公开的难题。为此,提出了加密图数据上正确性可验证的精确最短路径外包计算方案。该方案利用加法同态加密构造密态图数据上的广度优先最短路径计算算法,支持加密图数据的精确最短距离查询外包计算;其次,基于双线性映射累加器构造最短路径外包计算结果的概率正确性验证机制。分析和证明表明,该方案能以概率可靠性实现正确性可验证的精确最短路径的外包计算,具备随机预言模型下的IND-CCA2安全。对比实验结果表明,所提方案相比其他相关方案在安全性、功能性方面有显著优势,性能上较已有可验证图数据外包计算方案在初始化及加密环节、查询环节、验证及解密环节的时间开销分别降低了0.15%~23.19%,12.91%~30.89%和1.13%~18.62%。 展开更多
关键词 图数据外包计算 可验证 最短路径查询 密码累加器 同态加密
下载PDF
基于数据加密的传感器网络信息安全架构设计 被引量:1
18
作者 周浩 《齐齐哈尔大学学报(自然科学版)》 2024年第1期38-44,共7页
为了实现传感器数据的安全传输,基于椭圆曲线加密算法,设计传感器网络信息安全架构。架构分为传感器层、中段聚合器和顶层聚合器。传感器层完成数据检测、数据加密和数字签字,椭圆曲线倍点运算交由外包服务器进行运算;中段聚合器对发送... 为了实现传感器数据的安全传输,基于椭圆曲线加密算法,设计传感器网络信息安全架构。架构分为传感器层、中段聚合器和顶层聚合器。传感器层完成数据检测、数据加密和数字签字,椭圆曲线倍点运算交由外包服务器进行运算;中段聚合器对发送者、接收者、时间戳和数字签名进行验证,验证通过后,对所辖传感器的数据进行聚合,并完成数字签名,上传顶层聚合器;顶层聚合器对发送者、接收者、时间戳和数字签名进行验证,验证通过后,利用密钥对密文进行解密,得到传感器检测数据。系统测试结果表明,传感器层外包倍点运算可以显著提高运算效率;中段聚合器和顶层聚合器均具有较高运行效率。 展开更多
关键词 椭圆曲线 外包运算 数字签名 聚合验证
下载PDF
不同回收渠道下的再制造模式对比研究
19
作者 夏西强 李梦雅 路梦圆 《系统管理学报》 CSCD 北大核心 2024年第3期547-564,共18页
为分析知识产权保护下两种再制造模式对不同回收渠道选择的影响,通过建立基于外包和授权再制造模式的原始制造商回收、再制造商回收和零售商回收3种回收渠道博弈模型,从环境和收益双重角度研究了不同再制造模式下最优回收渠道选择。研... 为分析知识产权保护下两种再制造模式对不同回收渠道选择的影响,通过建立基于外包和授权再制造模式的原始制造商回收、再制造商回收和零售商回收3种回收渠道博弈模型,从环境和收益双重角度研究了不同再制造模式下最优回收渠道选择。研究发现:无论采取授权再制造还是外包再制造,不同回收渠道对新产品的批发和零售价格没有影响,主要通过影响授权费用、外包费用和再制造产品定价来调节两种产品的销售量。授权再制造模式下,原始制造商回收渠道实现了原始制造商、再制造商和零售商三者利润共赢,同时促进再制造产业发展、降低环境影响;外包再制造模式下,基于收益和环境双重考虑,再制造商回收渠道更具优势。授权再制造时选取原始制造商回收渠道与外包再制造时选取再制造商回收渠道对再制造产品销售量、环境和零售商利润的影响一样。然而,原始制造商和再制造商均倾向于选择自身回收渠道以实现最大利润。因此,在确定最优再制造模式和回收渠道时,需要考虑原始制造商和再制造商的回收能力。 展开更多
关键词 回收渠道 外包再制造 授权再制造 博弈模型
下载PDF
面向外包空间数据库的查询验证机制设计实现
20
作者 陈伟卫 王晶 《计算机仿真》 2024年第8期502-505,525,共5页
针对因外包数据库中数据基数大、身份特征难提取,导致的查询验证效率低、误差过大的问题,设计一种基于Hilbert曲线的查询验证机制。采用Hilbert曲线建立分析函数,线性贯穿二维、三维甚至更高维度的离散单元,描述外包空间数据库中数据在... 针对因外包数据库中数据基数大、身份特征难提取,导致的查询验证效率低、误差过大的问题,设计一种基于Hilbert曲线的查询验证机制。采用Hilbert曲线建立分析函数,线性贯穿二维、三维甚至更高维度的离散单元,描述外包空间数据库中数据在每个查询点的线性变化,将变化值映射到不同维度空间中,分别计算验证签名变化情况。求解数据在外包空间数据库中关键词权重,定义其为查询比对阈值,设定数据库中存在数据变换表,建立认证树,将计算得到的待验证数据节点权重输入至认证树中,查找对应信息,设定验证范围完成查询验证。实验结果表明,所提方法查询验证所需运算代价最小,在同等条件下验证耗时最少,验证结果与源数据存在高度一致性。 展开更多
关键词 外包空间数据库 查询验证机制 关键词权重 离散单元
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部