As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ...As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.展开更多
According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are ...According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are activated. A fatal fault can lead to significant loss, and even damage the safety-crltical system entirely when it is activated. A software reliability growth model for safety-critical systems is developed based on G - 0 model. And a software cost model is proposed too. The cost model considers maintenance and risk costs due to software failures. The optimal release policies are discussed to minimize the total software cost. A numerical exampie is provided to illustrate how to use the results we obtained.展开更多
In this study, the North China seismic region was selected as the study area, and evaluation of seismic hazard using the spatial smoothing seismicity model was performed. Firstly, the study area is divided into grids,...In this study, the North China seismic region was selected as the study area, and evaluation of seismic hazard using the spatial smoothing seismicity model was performed. Firstly, the study area is divided into grids, and some parameters (e. g. b-value, Mo, Me, azimuth and M-L relationship ) for each seismotectonic model were assigned. Secondly, using elliptical smoothing based on a seismotectonic background model, the statistical earthquake incidence rate in each grid is successively calculated. Lastly, the relevant ground motion attenuation relationship is chosen to assess seismic hazard of general sites. The maps for the distribution of horizontal peak ground acceleration with 10% probability of exceedance in 50 years were obtained by using the seismic hazard analysis method based on grid source. This seismicity model simplifies the methodology of probabilistic seismic hazard analysis, especially appropriate for those places where seismic tectonics is not yet clearly known. This method can provide valuable references for seismic zonation and seismic safety assessment for significant engineering projects.展开更多
基金ACKNOWLEDGEMENT This paper is supported by the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University, China (Grant No.KFKT2012B25) and National Science Foundation of China (Grant No.61303263).
文摘As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
基金Sponsored by the Ph.D. Programs Foundation of Ministry of Education of China (Grant No. 20020213017).
文摘According to the consequences of software failures, software faults remaining in safety-critical systems can be classified into two sets: common faults and fatal faults. Common faults cause slight loss when they are activated. A fatal fault can lead to significant loss, and even damage the safety-crltical system entirely when it is activated. A software reliability growth model for safety-critical systems is developed based on G - 0 model. And a software cost model is proposed too. The cost model considers maintenance and risk costs due to software failures. The optimal release policies are discussed to minimize the total software cost. A numerical exampie is provided to illustrate how to use the results we obtained.
基金funded by the Special Fund for Fundamental Research of Central-level Public Interest Institutions,China(ZDJ2011-13)
文摘In this study, the North China seismic region was selected as the study area, and evaluation of seismic hazard using the spatial smoothing seismicity model was performed. Firstly, the study area is divided into grids, and some parameters (e. g. b-value, Mo, Me, azimuth and M-L relationship ) for each seismotectonic model were assigned. Secondly, using elliptical smoothing based on a seismotectonic background model, the statistical earthquake incidence rate in each grid is successively calculated. Lastly, the relevant ground motion attenuation relationship is chosen to assess seismic hazard of general sites. The maps for the distribution of horizontal peak ground acceleration with 10% probability of exceedance in 50 years were obtained by using the seismic hazard analysis method based on grid source. This seismicity model simplifies the methodology of probabilistic seismic hazard analysis, especially appropriate for those places where seismic tectonics is not yet clearly known. This method can provide valuable references for seismic zonation and seismic safety assessment for significant engineering projects.