期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
论网络金融的风险监控 被引量:3
1
作者 高菲 《商业时代》 北大核心 2006年第9期65-66,共2页
为了确保互联网上电子交易的安全性(保密性,真实完整性和不可否认性),防范交易及支付过程中的欺诈行为,除了在信息传输过程中采用更强的加密算法等措施之外,还必须在网上建立信任及信任验证机制,以达到对网上交易风险实施有效监控和防范。
关键词 网络金融 风险监控 电子交易 信任验证机制
下载PDF
对增量CRL应用的一些研究
2
作者 段学群 谢俊元 《计算机应用与软件》 CSCD 北大核心 2003年第12期81-83,共3页
本文对PKIX依从系统中增量CRLs的应用进行了一些研究 ,包括 :增量CRL的时间跨度对性能的影响及其最优选择 ;基于完全CRL与增量CRL检查证书状态以及构造新的完全CRL的算法。
关键词 峰值带宽 信任验证 增量CRL 概率密度 证书吊销列表 存储库
下载PDF
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
3
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部