期刊文献+
共找到51篇文章
< 1 2 3 >
每页显示 20 50 100
Sec-Auditor:A Blockchain-Based Data Auditing Solution for Ensuring Integrity and Semantic Correctness
1
作者 Guodong Han Hecheng Li 《Computers, Materials & Continua》 SCIE EI 2024年第8期2121-2137,共17页
Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when ... Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when users perform file operations,the semantic integrity of the data can be compromised.Ensuring both data integrity and semantic correctness has become a critical issue that requires attention.We introduce a pioneering solution called Sec-Auditor,the first of its kind with the ability to verify data integrity and semantic correctness simultaneously,while maintaining a constant communication cost independent of the audited data volume.Sec-Auditor also supports public auditing,enabling anyone with access to public information to conduct data audits.This feature makes Sec-Auditor highly adaptable to open data environments,such as the cloud.In Sec-Auditor,users are assigned specific rules that are utilized to verify the accuracy of data semantic.Furthermore,users are given the flexibility to update their own rules as needed.We conduct in-depth analyses of the correctness and security of Sec-Auditor.We also compare several important security attributes with existing schemes,demonstrating the superior properties of Sec-Auditor.Evaluation results demonstrate that even for time-consuming file upload operations,our solution is more efficient than the comparison one. 展开更多
关键词 Provable data possession public auditing cloud storage data integrity semantic correctness
下载PDF
A Novel Provable Data Possession Scheme Based on Geographic Location Attribute
2
作者 Yaxing Zha Shoushan Luo +1 位作者 Jianchao Bian Wei Li 《China Communications》 SCIE CSCD 2016年第9期139-150,共12页
Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. Howeve... Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient. 展开更多
关键词 cloud storage security provable data possession geographic location security boundary CDH assumption
下载PDF
Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices
3
作者 Yining Qi Zhen Yang +2 位作者 Yubo Luo Yongfeng Huang Xing Li 《Computers, Materials & Continua》 SCIE EI 2022年第11期2205-2221,共17页
Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low pe... Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low performance devices such as Internet of Things,we find that there are still two obstacles for applying PDP schemes.The first one is the heavy computation overhead in generating tags for data blocks,which is essential for setting up any PDP scheme.The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing.In this paper,we propose a novel blockchain-based light-weighted PDP scheme for low performance devices,with an instance deployed on a cloud server.We design a secure outsourced tag generating method for low performance devices,which enables a kind of“hash-sign-switch”two-phase tag computing.With this method,users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation,without leaking their data content.Chaincodes in blockchain network ensure the correctness of such outsourcing and prevent collusion attacks.The security analysis and performance evaluation prove that our scheme is both secure and efficient. 展开更多
关键词 Provable data possession outsourced computation blockchain smart contract chameleon hash
下载PDF
Reducing Computational and Communication Complexity for Dynamic Provable Data Possession
4
作者 刘妃妃 谷大武 +2 位作者 陆海宁 龙斌 李晓晖 《China Communications》 SCIE CSCD 2011年第6期67-75,共9页
Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files... Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works, our proposal reduces the computational and communication complexity from O(logn) to O(1). We did some experiments to ensure this improvement and extended the model to file sharing situation. 展开更多
关键词 cloud computing proofs of storage dynamic provable data possession file sharing
下载PDF
Possessions Ceded for the Benefit of the Hospitals and Churches From the Sighisoara County
5
作者 Mariana Borcoman 《Journal of Literature and Art Studies》 2013年第4期255-262,共8页
Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania beca... Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania became attractive for the neighboring Hungarian royalty and later on, in the 1 lth century it was annexed into Hungary. For a better control of the newly annexed territory and in order to convert the orthodox population to Catholicism, the Hungarian rulers brought the Szeklers to Transilvania and two centuries later, German originating populations, from Rhine, Luxemburg, and Saxony (the name of Sas people, or Saxon of Transilvania derives from "Saxony"). The aim of this paper is to focus on the Sighisoara County, namely on the easement of certain areas for temporary or permanent maintenance or use by the church and hospitals in the region. That was a common practice in Medieval Europe aimed at ensuring the survival means for these institutions. However, it was not the only one to serve this goal. There were also donations on behalf of various people or allocations of money by the county authorities. The documents attesting this are unpublished, unedited and are to be found in the archives of the Brasov County, Budapest, and Vienna. They are the stepping stone of this paper and hence, they grant its originality. The objectives of the paper are to bring arguments in favor of the thesis that community money was directed towards meeting the needs of the hospitals, as well as towards supporting the widows, the orphans, and the needy ones. Worth noting in this respect is the management of the funds ceded to the church and county hospitals and that actually benefitted the whole community. Moreover, the paper also emphasizes the role played by education, since the latter is an important landmark for a community's development level 展开更多
关键词 COUNTY CRAFT "dica" tax possessions great landed property MAGISTRATE bestowed properties
下载PDF
Analysis of bona fide acquisition under possession reformulation
6
作者 Huochenchen 《International Journal of Technology Management》 2017年第3期23-25,共3页
The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation betw... The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation between possession and ownership become more and more universal. There is a potential conflict between possession reform and the announcement of property right of property as a sign of delivery, which has been brought up again in civil law circles. Based on the measure of interest and value analysis, on the possession case of bona fide acquisition system is discussed and reflection, in under the bona fide possession of the application, the modified say. With a view to China' s ongoing property rights legislation to benefit. 展开更多
关键词 possession modification bona fide acquisition PUBLICITY
下载PDF
The Enclosed Personal Space and Female Identity Construction in A. S. Byatt's Possession
7
作者 叶柳影 《海外英语》 2018年第18期206-209,共4页
From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay inten... From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction. 展开更多
关键词 A. S. BYATT possession Space FEMALE IDENTITY HARMONIOUS CO-EXISTENCE
下载PDF
Paradise Archetype in Possession
8
作者 吴菲 TIAN Ye 《海外英语》 2018年第1期154-155,共2页
A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this pape... A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this paper analyzes the epic poems"The Garden of Proserpina"so as to identify the hidden creation theme from paradise archetype. 展开更多
关键词 paradise archetype Northrop Frye archetypal criticism A S BYATT possession
下载PDF
The Quest Motif in Possession
9
作者 吴菲 《海外英语》 2018年第4期129-130,共2页
The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the q... The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the quest motif from our modern hero's discovery journey in Possession. 展开更多
关键词 "Glass Coffin" Brothers Grimm the quest motif A. S. Byatt possession
下载PDF
Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation 被引量:1
10
作者 Yining Qi Yubo Luo +1 位作者 Yongfeng Huang Xing Li 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期183-199,共17页
Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data s... Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data security threats,even more complex.When a user quit its group,remaining data block signatures must be re-signed to ensure security.Some researchers noticed this problem and proposed a few works to relieve computing overhead on user side.However,considering the privacy and security need of group auditing,there still lacks a comprehensive solution to implement secure group user revocation,supporting identity privacy preserving and collusion attack resistance.Aiming at this target,we construct a concrete scheme based on ring signature and smart contracts.We introduce linkable ring signature to build a kind of novel meta data for integrity proof enabling anonymous verification.And the new meta data supports secure revocation.Meanwhile,smart contracts are using for resisting possible collusion attack and malicious re-signing computation.Under the combined effectiveness of both signature method and blockchain smart contracts,our proposal supports reliable user revocation and signature re-signing,without revealing any user identity in the whole process.Security and performance analysis compared with previous works prove that the proposed scheme is feasible and efficient. 展开更多
关键词 Provable data possession data integrity blockchain ring signature
下载PDF
Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data
11
作者 Yining Qi Yubo Luo +1 位作者 Yongfeng Huang Xing Li 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2603-2618,共16页
Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,wh... Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,which is called group data sharing.As all kinds of cloud service,data group sharing also suffers from hardware/software failures and human errors.Provable Data Posses-sion(PDP)schemes are proposed to check the integrity of data stored in cloud without downloading.However,there are still some unmet needs lying in auditing group shared data.Researchers propose four issues necessary for a secure group shared data auditing:public verification,identity privacy,collusion attack resis-tance and traceability.However,none of the published work has succeeded in achieving all of these properties so far.In this paper,we propose a novel block-chain-based ring signature PDP scheme for group shared data,with an instance deployed on a cloud server.We design a linkable ring signature method called Linkable Homomorphic Authenticable Ring Signature(LHARS)to implement public anonymous auditing for group data.We also build smart contracts to resist collusion attack in group auditing.The security analysis and performance evalua-tion prove that our scheme is both secure and efficient. 展开更多
关键词 Provable data possession data integrity blockchain ring signature
下载PDF
Human Habitats and Malaria Vector Control in Benin: Current Situation and Implications for Effective Control
12
作者 Barikissou G. Damien Armel Djènontin +1 位作者 Badirou Aguemon Franck Remoué 《Advances in Infectious Diseases》 2023年第4期706-721,共16页
Long-lasting insecticide-treated nets (LLINs) and indoor residual spraying (IRS) are the main indoor malaria vector tools control tools. The study examined housing characteristics and investigated the relationship bet... Long-lasting insecticide-treated nets (LLINs) and indoor residual spraying (IRS) are the main indoor malaria vector tools control tools. The study examined housing characteristics and investigated the relationship between the total volume of household possessions, the volume of the sleeping room, and the hanging of LLINs. A total of 831 bedrooms were randomly selected in Benin in 2015. The findings showed that mud walls were predominant in rural areas (more than 75%), while metal roofs were common (77.3% - 97.9%). Battery-powered lighting was prevalent in rural areas in Northern (97%), while open-flame oil lamps were commonly used in rural areas in Southern (86%). The availability of correct bedding was low, ranging from 1% to 10% in all households. 20% of the bedrooms had at least 50% of their volume occupied by household possessions in urban areas. In rural areas, bedrooms without LLINs had a lower mean rate ratio of the volume occupied by possessions per the total volume of the room compared to bedrooms with at least one LLIN installed (p < 0.0001). The characteristics of human habitats are not favourable to the correct use of vector control intervention indoors. It is therefore important to improve people’s living conditions as the next step for malaria elimination. 展开更多
关键词 HOUSING LIGHTING BEDDING possessions Malaria Vector Control LLINs IRS
下载PDF
Optimized Algorithms for Flexible Length-Based Authenticated Skip List 被引量:1
13
作者 XU Jian LI Mingjie +2 位作者 LI Fuxiang YANG Qingsong ZHOU Fucai 《China Communications》 SCIE CSCD 2016年第1期124-138,共15页
With the growing trend toward using cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Many cryptography and security schemes,such as PDP(Provable Data Possession) an... With the growing trend toward using cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Many cryptography and security schemes,such as PDP(Provable Data Possession) and POR(Proofs of Retrievability) were proposed for this problem.Although many efficient schemes for static data have been constructed,only a few dynamic schemes exist,such as DPDP(Dynamic Provable Data Possession).But the DPDP scheme falls short when updates are not proportional to a fixed block size.The FlexList-based Dynamic Provable Data Possession(FlexDPDP) was an optimized scheme for DPDP.However,the update operations(insertion,remove,modification)in Flex DPDP scheme only apply to single node at a time,while multiple consecutive nodes operation is more common in practice.To solve this problem,we propose optimized algorithms for multiple consecutive nodes,which including MultiNodes Insert and Verification,MultiNodes Remove and Verification,MultiNodes Modify and Verification.The cost of our optimized algorithms is also analyzed.For m consecutive nodes,an insertion takes O(m) + O(log N) + O(log m),where N is the number of leaf nodes of FlexList,a remove takes O(log/V),and a modification is the same as the original algorithm.Finally,we compare the optimized algorithms with original FlexList through experiences,and the results show that our scheme has the higher efficiency of time and space. 展开更多
关键词 authenticated skip list provable data possession data integrity
下载PDF
The Study of M cell's Characteristics of Action Potential and Its Transient Outward Current 被引量:1
14
作者 Ding Guoliang Yang Lin Cui Changcong Du Kexin Cao Shiping Chen Qian Liu Yan,Oept of Cardiology,1st Teaching Hospital of Xian Medical University,Xian,710061,China 《中国介入心脏病学杂志》 1998年第4期190-190,共1页
Introduction:Some studles have described the M cells in the deepsubeploardial to midmyooardial layers of the canine ventricle.Transient outward current of potasium(ito)initiate the repolarization ofaction potentials,a... Introduction:Some studles have described the M cells in the deepsubeploardial to midmyooardial layers of the canine ventricle.Transient outward current of potasium(ito)initiate the repolarization ofaction potentials,and has an important effect on the configuration ofaction potential of epicardium and endocardium.So.it is necessary tostudy further about the contribution of ito in M cells.Methods:Standard glass microelectrode was used to observe actionpotential properties of M cell in canine ventricular tissue allce.The whotecell patch clamp was used to investigate the effect of M cell’s ito oh itsaction potential.Results:(1)configuration of action potential:M cell and epicardialpossess prominent spike and dome configuration at early repolarization,but lucks of it in endocardium.(2)Characteristics of action potential:resting potential in M cell was more negtive than of apicardium andendocardium(respectively-88.,-66.5 and -85.9mv),but no statistic’ssignificance.Vmax in M cell possessed much greater than inendocardium and epicardium(299.0,197.6 and 160.4V/s).APD90 in Mcell was longer thin In eplcardium and endocardium(304,227 and211ms when BCL-1000ms);(3)M cell had more rate dependence ofaction potential duration than endocardium and endocardinm when BCLwas 500-5000ms;(4)ito in M cell and epicardium are aignifcantly greaterthan that in endocardium;(5)ito has obvious rate dependence,whenBCL lengthened,ito became strong.Conclutions:M cell possesses special characterlatics of actionpotential,such as obvious spike and dome configuration,much greaterVmax,longer action potential duration and more rate dependence,ito inM cell is one of the ionic busis of its having spike and dome morphologyand obvious rate dependence.vious rite dependence. 展开更多
关键词 CANINE SPIKE initiate CLAMP PATCH RESTING VENTRICLE possessed statistic longer
下载PDF
表示“拥有”的own和possess可用于被动语态吗?
15
作者 李应清 《英语知识》 2004年第11期48-48,共1页
[问][431]表示“拥有”的own和possess 可用于被动语态吗? [答]静态动词(stative verb)have作“拥有”讲,不能用于被动语态,这是不争的事实。但是国内有些作者也许受此影响,在没有进行语言调查的情况下,宣称表示“拥有”的own和possess... [问][431]表示“拥有”的own和possess 可用于被动语态吗? [答]静态动词(stative verb)have作“拥有”讲,不能用于被动语态,这是不争的事实。但是国内有些作者也许受此影响,在没有进行语言调查的情况下,宣称表示“拥有”的own和possess均不能用于被动语态。如全国高等教育自学考试指定教材《现代英语语法》的配套参考书(中华书局,2003)的编者指出,作“拥有”解的possess不以被动语态的形式出现。实际上,情况并非如此。首先,请看own用于被动语态的例子: 展开更多
关键词 “拥有” OWN POSSESS 被动语态 大学英语 学习难点 学习辅导
下载PDF
Analysis and Forecast on the Car Market of Our Country
16
作者 李瑞 梁庆文 《Chinese Quarterly Journal of Mathematics》 CSCD 1999年第1期55-61, ,共7页
This paper is intended to forecast the demand of the car market and the quantity of car possession in our country in 2000 by means of two statistics methods, i.e. tendency inference and regression analysis, and then i... This paper is intended to forecast the demand of the car market and the quantity of car possession in our country in 2000 by means of two statistics methods, i.e. tendency inference and regression analysis, and then its future growth tendency and market demand in our country are analyzed, according to the strategy requirement and the actual facts of our car industry development. 展开更多
关键词 car industry analysis method market demand the quantity of car possession FORECAST regression analysis
下载PDF
The Great Time,the Three Societies in the Globalization and the Three Souls of a Leftist Today
17
作者 Endre Kiss 《Journal of Environmental Science and Engineering(B)》 2018年第9期344-353,共10页
The first society would be the society of the good will.Already several times discussed,for which the value-oriented life of this year can no longer become an open problem.We define the second society provisionally as... The first society would be the society of the good will.Already several times discussed,for which the value-oriented life of this year can no longer become an open problem.We define the second society provisionally as the one,which is fundamentally not constituted by the above described good will.In the following,we will try to identify it in this abstract description as the society of the“majority”.We see the third society in that political class or elite,which power has been built in the year 1989 and thus became the concretization of that establishment,with which the“first”society identified itself so totally.This tripartition of the real existing Left might also explain,why its political articulation is so fragmented.A Leftist should have today three souls:one of the winners(the elite,as a member of our third class),one of the losers(as a member of our second class)and one of the man of good will(as a member of our first class),who very enjoyed in its total identification with the own system.And authors have drawn some meaningful conclusions. 展开更多
关键词 Political HERMENEUTICS splitting of SOCIETY cleavage GLOBALIZATION global SOCIETY identification thrust manipulation SOCIETY of good will media possession.
下载PDF
Higher Level of Social Development—Enlightenism
18
作者 Jargal Dorj 《Journal of Philosophy Study》 2020年第5期279-292,共14页
This article determined the cause of social suffering by using set theory and also demonstrated that the cause of any suffering is the emptiness quality of Yang and Ying of the phenomena or“ownership”view and have b... This article determined the cause of social suffering by using set theory and also demonstrated that the cause of any suffering is the emptiness quality of Yang and Ying of the phenomena or“ownership”view and have been given its definition.It described the society free from the basic suffering as named enlightened society or enlightenism like one of the formations of the social development and explained its scientific evidence and described the cause and condition of this society’s evolution and development. 展开更多
关键词 EMPTINESS CAPITALISM COMMUNISM industrialism PRICE possession NIRVANA
下载PDF
Data Integrity Checking Protocol with Data Dynamics in Cloud Computing
19
作者 Junjie Feng Shigong Long 《International Journal of Communications, Network and System Sciences》 2017年第5期274-282,共9页
We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work... We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work, Ateniese et al. proposed a remote data integrity checking protocol that supports data partial dynamics. In this paper, we present a new remote data possession checking protocol which allows an unlimited number of file integrity verifications and efficiently supports dynamic operations, such as data modification, deletion, insertion and append. The proposed protocol supports public verifiability. In addition, the proposed protocol does not leak any private information to third-party verifiers. Through a specific analysis, we show the correctness and security of the protocol. After that, we demonstrate the proposed protocol has a good performance. 展开更多
关键词 Provable DATA possession (PDP) Cloud Storage DATA DYNAMICS Public Verifiability DATA INTEGRITY
下载PDF
ISOVALEROYL OXOKADSURANE,A NOVEL DIBENZOCYCLOOCTADIENE LIGNAN POSSESSING A SPIROBENZOPURANOID SKELETON
20
作者 Lian Niang LI Xiang Jun QI Cun Heng HE and Qi Tai ZHENG Institute of Materia Medica,Chinese Academy of Medical Sciences,Beijing 100050,China 《Chinese Chemical Letters》 SCIE CAS CSCD 1990年第1期37-38,共2页
Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ra... Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ray diffraction analysis. 展开更多
关键词 ISOVALEROYL OXOKADSURANE A NOVEL DIBENZOCYCLOOCTADIENE LIGNAN POSSESSING A SPIROBENZOPURANOID SKELETON
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部