How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat...How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.展开更多
For the safety protection of passengers when train crashes occur, special structures are crucially needed as a kind of indispensable energy absorbing device. With the help of the structures, crash kinetic-energy can b...For the safety protection of passengers when train crashes occur, special structures are crucially needed as a kind of indispensable energy absorbing device. With the help of the structures, crash kinetic-energy can be completely absorbed or dissipated for the aim of safety. Two composite structures(circumscribed circle structure and inscribed circle structure) were constructed. In addition, comparison and optimization of the crashworthy characteristic of the two structures were carried out based on the method of explicit finite element analysis(FEA) and Kriging surrogate model. According to the result of Kriging surrogate model, conclusions can be safely drawn that the specific energy absorption(SEA) and ratio of specific energy absorption to initial peak force(REAF) of circumscribed circle structure are lager than those of inscribed circle structure under the same design parameters. In other words, circumscribed circle structure has better performances with higher energy-absorbing ability and lower initial peak force. Besides, error analysis was adopted and the result of which indicates that the Kriging surrogate model has high nonlinear fitting precision. What is more, the SEA and REAF optimum values of the two structures have been obtained through analysis, and the crushing results have been illustrated when the two structures reach optimum SEA and REAF.展开更多
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to...The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.展开更多
文摘How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.
基金Projects(51405516,U1334208)supported by the National Natural Science Foundation of ChinaProject(2013GK2001)supported by the Science and Technology Program for Hunan Provincial Science and Technology Department,ChinaProject(2013zzts040)supported by the Graduate Degree Thesis Innovation Foundation of Central South University,China
文摘For the safety protection of passengers when train crashes occur, special structures are crucially needed as a kind of indispensable energy absorbing device. With the help of the structures, crash kinetic-energy can be completely absorbed or dissipated for the aim of safety. Two composite structures(circumscribed circle structure and inscribed circle structure) were constructed. In addition, comparison and optimization of the crashworthy characteristic of the two structures were carried out based on the method of explicit finite element analysis(FEA) and Kriging surrogate model. According to the result of Kriging surrogate model, conclusions can be safely drawn that the specific energy absorption(SEA) and ratio of specific energy absorption to initial peak force(REAF) of circumscribed circle structure are lager than those of inscribed circle structure under the same design parameters. In other words, circumscribed circle structure has better performances with higher energy-absorbing ability and lower initial peak force. Besides, error analysis was adopted and the result of which indicates that the Kriging surrogate model has high nonlinear fitting precision. What is more, the SEA and REAF optimum values of the two structures have been obtained through analysis, and the crushing results have been illustrated when the two structures reach optimum SEA and REAF.
基金supported in part by the National Natural Science Foundation of China under Grant Nos. 61033014,60970110,60972034the National 973 Program under Grant No.2007CB311201
文摘The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.