In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro...In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.展开更多
Holographic QSAR model is constructed to predict relative binding affinities of estradiol derivatives with lamb uterine estrogen receptor. The method does not require the generation of three-dimensional structure of t...Holographic QSAR model is constructed to predict relative binding affinities of estradiol derivatives with lamb uterine estrogen receptor. The method does not require the generation of three-dimensional structure of the compounds. The factors that influence the quality of QSAR model are discussed. The result indicates that the model has good predictability and yields a high q2LOO value of 0.897. Compared to other QSAR methods, the HQSAR technique is suitable for use in screening large database of chemicals.展开更多
基金supported by National Science and Technology Major Project under Grant No.2012ZX03002003Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No.2011009Open Research Project of State Key Laboratory of Information Security in Institute of Software,Chinese Academy of Sciences
文摘In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.
基金supported by the National Natural Science Foundation of China(Grant No.29837180)the“863”Program(Grant No.2001AA646010-4)the core university program of Japan Society for Promotion of Science.
文摘Holographic QSAR model is constructed to predict relative binding affinities of estradiol derivatives with lamb uterine estrogen receptor. The method does not require the generation of three-dimensional structure of the compounds. The factors that influence the quality of QSAR model are discussed. The result indicates that the model has good predictability and yields a high q2LOO value of 0.897. Compared to other QSAR methods, the HQSAR technique is suitable for use in screening large database of chemicals.