In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte...In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.展开更多
Design of rib support systems in U.S. coal mines is based primarily on local practices and experience. A better understanding of current rib support practices in U.S. coal mines is crucial for developing a sound engin...Design of rib support systems in U.S. coal mines is based primarily on local practices and experience. A better understanding of current rib support practices in U.S. coal mines is crucial for developing a sound engineering rib support design tool. The objective of this paper is to analyze the current practices of rib control in U.S. coal mines. Twenty underground coal mines were studied representing various coal basins,coal seams,geology,loading conditions,and rib control strategies. The key findings are:(1) any rib design guideline or tool should take into account external rib support as well as internal bolting;(2) rib bolts on their own cannot contain rib spall,especially in soft ribs subjected to significant load—external rib control devices such as mesh are required in such cases to contain rib sloughing;(3) the majority of the studied mines follow the overburden depth and entry height thresholds recommended by the Program Information Bulletin 11-29 issued by the Mine Safety and Health Administration;(4) potential rib instability occurred when certain geological features prevailed—these include draw slate and/or bone coal near the rib/roof line,claystone partings,and soft coal bench overlain by rock strata;(5) 47% of the studied rib spall was classified as blocky—this could indicate a high potential of rib hazards; and(6) rib injury rates of the studied mines for the last three years emphasize the need for more rib control management for mines operating at overburden depths between 152.4 m and 304.8 m.展开更多
Complex cyber-physical network refers to a new generatio~ of complex networks whose normal functioning significantly relies on tight interactions between its physical and cyber compo- nents. Many modern critical infra...Complex cyber-physical network refers to a new generatio~ of complex networks whose normal functioning significantly relies on tight interactions between its physical and cyber compo- nents. Many modern critical infrastructures can be appropriately modelled as complex cyber-physical networks. Typical examples of such infrastructures are electrical power grids, WWW, public trans- portation systems, state financial networks, and the Interact. These critical facilities play important roles in ensuring the stability of society as well as the development of economy. Advances in informa- tion and communication technology open opportunities for malicious attackers to launch coordinated attacks on cyber-physical critical facilities in networked infrastructures from any Interact-accessible place. Cybersecurity of complex cyber-physical networks has emerged as a hot topic within this con- text. In practice, it is also very crucial to understand the interplay between the evolution of underlying network structures and the collective dynamics on these complex networks and consequently to design efficient security control strategies to protect the evolution of these networks. In this paper, cybersecu- rity of complex cyber-physical networks is first outlined and then some security enhancing techniques, with particular emphasis on safety communications, attack detection and fault-tolerant control, are suggested. Furthermore, a new class of efficient secure the achievement of desirable pinning synchronization control strategies are proposed for guaranteeing behaviors in complex cyber-physical networks against malicious attacks on nodes. The authors hope that this paper motivates to design enhanced security strategies for complex cyber-physical network systems, to realize resilient and secure critical infrastructures.展开更多
基金supported by the National Science Foundation of China (No.61373040,No.61173137)The Ph.D.Pro-grams Foundation of Ministry of Education of China(20120141110073)Key Project of Natural Science Foundation of Hubei Province (No.2010CDA004)
文摘In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.
文摘Design of rib support systems in U.S. coal mines is based primarily on local practices and experience. A better understanding of current rib support practices in U.S. coal mines is crucial for developing a sound engineering rib support design tool. The objective of this paper is to analyze the current practices of rib control in U.S. coal mines. Twenty underground coal mines were studied representing various coal basins,coal seams,geology,loading conditions,and rib control strategies. The key findings are:(1) any rib design guideline or tool should take into account external rib support as well as internal bolting;(2) rib bolts on their own cannot contain rib spall,especially in soft ribs subjected to significant load—external rib control devices such as mesh are required in such cases to contain rib sloughing;(3) the majority of the studied mines follow the overburden depth and entry height thresholds recommended by the Program Information Bulletin 11-29 issued by the Mine Safety and Health Administration;(4) potential rib instability occurred when certain geological features prevailed—these include draw slate and/or bone coal near the rib/roof line,claystone partings,and soft coal bench overlain by rock strata;(5) 47% of the studied rib spall was classified as blocky—this could indicate a high potential of rib hazards; and(6) rib injury rates of the studied mines for the last three years emphasize the need for more rib control management for mines operating at overburden depths between 152.4 m and 304.8 m.
基金supported by the National Key Research and Development Program of China under Grant No.2016YFB0800401the National Nature Science Foundation of China under Grant Nos.61304168,61673104,and 61322302+3 种基金the Natural Science Foundation of Jiangsu Province of China under Grant No.BK20130595the National Ten Thousand Talent Program for Young Top-Notch Talents,the Six Talent Peaks of Jiangsu Province of China under Grant No.2014-DZXX-004the Doctoral Program of Higher Education of China under Grant No.20130092120030the Fundamental Research Funds for the Central Universities of China under Grant No.2242016K41030
文摘Complex cyber-physical network refers to a new generatio~ of complex networks whose normal functioning significantly relies on tight interactions between its physical and cyber compo- nents. Many modern critical infrastructures can be appropriately modelled as complex cyber-physical networks. Typical examples of such infrastructures are electrical power grids, WWW, public trans- portation systems, state financial networks, and the Interact. These critical facilities play important roles in ensuring the stability of society as well as the development of economy. Advances in informa- tion and communication technology open opportunities for malicious attackers to launch coordinated attacks on cyber-physical critical facilities in networked infrastructures from any Interact-accessible place. Cybersecurity of complex cyber-physical networks has emerged as a hot topic within this con- text. In practice, it is also very crucial to understand the interplay between the evolution of underlying network structures and the collective dynamics on these complex networks and consequently to design efficient security control strategies to protect the evolution of these networks. In this paper, cybersecu- rity of complex cyber-physical networks is first outlined and then some security enhancing techniques, with particular emphasis on safety communications, attack detection and fault-tolerant control, are suggested. Furthermore, a new class of efficient secure the achievement of desirable pinning synchronization control strategies are proposed for guaranteeing behaviors in complex cyber-physical networks against malicious attacks on nodes. The authors hope that this paper motivates to design enhanced security strategies for complex cyber-physical network systems, to realize resilient and secure critical infrastructures.