Purpose: To explore the interventional effects of campus psychodrama on improving the interpersonal trust among college students. Methods: 16 college students with low levels of interpersonal trust were selected to co...Purpose: To explore the interventional effects of campus psychodrama on improving the interpersonal trust among college students. Methods: 16 college students with low levels of interpersonal trust were selected to conduct 5 sessions of psychodrama therapy. Results: The subject group has gone through stages of ice breaking, performance, and sharing. Through group counseling with psychodrama, the social avoidance and distressful behaviors of the subjects have been alleviated, and their levels of interpersonal trust demonstrated notable change. Conclusion: Campus psychodrama is an effective group counseling approach for improving college students’ interpersonal trust.展开更多
The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this...The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.展开更多
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation...In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.展开更多
Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the...Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance.展开更多
A fair electronic cash system is a system that allows customers to make payments anonymously. Furthermore the trusted third party can revoke the anonymity when the customers did illegal transactions. In this paper, a ...A fair electronic cash system is a system that allows customers to make payments anonymously. Furthermore the trusted third party can revoke the anonymity when the customers did illegal transactions. In this paper, a new fair electronic cash system based on group signature scheme by using elliptic curve cryptography is proposed, which satisfies properties of secure group signature scheme (correctness, unforgeability, etc). Moreover, our electronic cash contains group members (users, merchants and banks) and trusted third party which is acted by central bank as group manager.展开更多
在物流供应商选择过程中,针对分布式评价语言环境下专家评价信息不完整问题,提出社会网络下考虑信息补全的群决策方法。考虑专家接受间接信任关系可能性的大小,提出一种新的信任传递模型来完善专家间的信任值;首次拓展Jensen-Shannon散...在物流供应商选择过程中,针对分布式评价语言环境下专家评价信息不完整问题,提出社会网络下考虑信息补全的群决策方法。考虑专家接受间接信任关系可能性的大小,提出一种新的信任传递模型来完善专家间的信任值;首次拓展Jensen-Shannon散度到分布式评价语言距离度量上,用于衡量专家之间的相似度;基于K-临近算法,设计改进的残缺评价信息补全方法;对专家信息进行集结并构建共识度量与反馈调节机制,得到群决策矩阵,并运用改进的EDAS(evaluation based on distance from average solution,离平均方案(平均解)距离)方法对方案进行排序;通过物流服务供应商综合评估算例验证该群决策方法的可行性和有效性。展开更多
文摘Purpose: To explore the interventional effects of campus psychodrama on improving the interpersonal trust among college students. Methods: 16 college students with low levels of interpersonal trust were selected to conduct 5 sessions of psychodrama therapy. Results: The subject group has gone through stages of ice breaking, performance, and sharing. Through group counseling with psychodrama, the social avoidance and distressful behaviors of the subjects have been alleviated, and their levels of interpersonal trust demonstrated notable change. Conclusion: Campus psychodrama is an effective group counseling approach for improving college students’ interpersonal trust.
基金Supported by the National Natural Science Foun-dation of China (60363001 ,60373087 ,90104005 ,60473023)
文摘The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.
基金Supported by the National High-Technology Re-search and Development Program ( 863 Program)China(2004AA113020)
文摘In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.
基金supported by the National Natural Science Foundation of China (The key trusted running technologies for the sensing nodes in Internet of things: 61501007, The research of the trusted and security environment for high energy physics scientific computing system: 11675199)General Project of science and technology project of Beijing Municipal Education Commission: KM201610005023+2 种基金the outstanding personnel training program of Beijing municipal Party Committee Organization Department (The Research of Trusted Computing environment for Internet of things in Smart City: 2014000020124G041)The key technology research and validation issue for the emergency treatment telemedicine public service platform which integrates the military and civilian and bases on the broadband wireless networks (No.2013ZX03006001-005)the issue belongs to Major national science and technology projects
文摘Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance.
文摘A fair electronic cash system is a system that allows customers to make payments anonymously. Furthermore the trusted third party can revoke the anonymity when the customers did illegal transactions. In this paper, a new fair electronic cash system based on group signature scheme by using elliptic curve cryptography is proposed, which satisfies properties of secure group signature scheme (correctness, unforgeability, etc). Moreover, our electronic cash contains group members (users, merchants and banks) and trusted third party which is acted by central bank as group manager.
文摘在物流供应商选择过程中,针对分布式评价语言环境下专家评价信息不完整问题,提出社会网络下考虑信息补全的群决策方法。考虑专家接受间接信任关系可能性的大小,提出一种新的信任传递模型来完善专家间的信任值;首次拓展Jensen-Shannon散度到分布式评价语言距离度量上,用于衡量专家之间的相似度;基于K-临近算法,设计改进的残缺评价信息补全方法;对专家信息进行集结并构建共识度量与反馈调节机制,得到群决策矩阵,并运用改进的EDAS(evaluation based on distance from average solution,离平均方案(平均解)距离)方法对方案进行排序;通过物流服务供应商综合评估算例验证该群决策方法的可行性和有效性。