In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in...In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.展开更多
For any Pisot number β it is known that the set F(β) ={t : limn→∞‖tβn‖ = 0} is countable, where ‖α‖ is the distance between a real number a and the set of integers. In this paper it is proved that every m...For any Pisot number β it is known that the set F(β) ={t : limn→∞‖tβn‖ = 0} is countable, where ‖α‖ is the distance between a real number a and the set of integers. In this paper it is proved that every member in this set is of the form cβn, where n is a nonnegative integer and e is determined by a linear system of equations. Furthermore, for some self-similar measures μ associated with β, the limit at infinity of the Fourier transforms limn→μ(tβn)≠0 if and only if t is in a certain subset of F(β). This generalizes a similar result of Huang and Strichartz.展开更多
On the basis of prioritized aggregated operator and prioritized ordered weighted average(POWA)operator,in this paper,the authors further present interval neutrosophic prioritized ordered weighted aggregation(INPOWA)op...On the basis of prioritized aggregated operator and prioritized ordered weighted average(POWA)operator,in this paper,the authors further present interval neutrosophic prioritized ordered weighted aggregation(INPOWA)operator with respect to interval neutrosophic numbers(INNs).Firstly,the definition,operational laws,characteristics,expectation and comparative method of INNs are introduced.Then,the INPOWA operator is developed,and some properties of the operator are analyzed.Furthermore,based on the INPOWA operator and the comparative formula of the INNs,an approach to decision making with INNs is established.Finally,an illustrative example is given to verify the developed approach and to demonstrate its practicality and effectiveness.展开更多
基金ACKNOWLEDGEMENTS This work has been supported by the National Natural Science Foundation of China under Grant No. 61272519, 61121061.
文摘In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.
文摘For any Pisot number β it is known that the set F(β) ={t : limn→∞‖tβn‖ = 0} is countable, where ‖α‖ is the distance between a real number a and the set of integers. In this paper it is proved that every member in this set is of the form cβn, where n is a nonnegative integer and e is determined by a linear system of equations. Furthermore, for some self-similar measures μ associated with β, the limit at infinity of the Fourier transforms limn→μ(tβn)≠0 if and only if t is in a certain subset of F(β). This generalizes a similar result of Huang and Strichartz.
基金supported by the National Natural Science Foundation of China under Grant Nos.71471172and 71271124the Humanities and Social Sciences Research Project of Ministry of Education of China under Grant No.13YJC630104+2 种基金Shandong Provincial Social Science Planning Project under Grant No.13BGLJ10the National Soft Science Research Project under Grant No.2014GXQ4D192the Natural Science Foundation of Shandong Province under Grant No.ZR2014JL046
文摘On the basis of prioritized aggregated operator and prioritized ordered weighted average(POWA)operator,in this paper,the authors further present interval neutrosophic prioritized ordered weighted aggregation(INPOWA)operator with respect to interval neutrosophic numbers(INNs).Firstly,the definition,operational laws,characteristics,expectation and comparative method of INNs are introduced.Then,the INPOWA operator is developed,and some properties of the operator are analyzed.Furthermore,based on the INPOWA operator and the comparative formula of the INNs,an approach to decision making with INNs is established.Finally,an illustrative example is given to verify the developed approach and to demonstrate its practicality and effectiveness.