期刊文献+
共找到554篇文章
< 1 2 28 >
每页显示 20 50 100
Modelling the Roles of Cewebrity Trust and Platform Trust in Consumers’Propensity of Live-Streaming:An Extended TAM Method 被引量:8
1
作者 Donghui Li Guozheng Zhang +4 位作者 Zeng Xu Yong Lan Yongdong Shi Zhiyao Liang Haiwen Chen 《Computers, Materials & Continua》 SCIE EI 2018年第4期137-150,共14页
Live streaming is a booming industry in China,involving an increasing number of Internet users.Previous studies show that trust is a cornerstone to develop ecommerce.Trust in the streaming industry is different from t... Live streaming is a booming industry in China,involving an increasing number of Internet users.Previous studies show that trust is a cornerstone to develop ecommerce.Trust in the streaming industry is different from that of other e-commerce areas.There are two major dimensions of trust in the live streaming context:platform trust and cewebrity trust,which are both important for customers to adopt and reuse a specific live streaming service.We collected questionnaire data from 520 participates who have used live streaming services in China.We model the collected data and identified factors that can influence users’propensity by an extended technology acceptance model(TAM)method.According to our analysis,both cewebrity trust and platform trust will greatly influence users’intention to reuse a certain platform.Moreover,results also indicate that cewebrity trust is far more important than platform trust.These findings can lead to several management strategies to improve the adherence of users to streaming platforms. 展开更多
关键词 Live streaming extended TAM approach consumers’propensity cewebrity trust platform trust
下载PDF
A Method to Implement Full Anonymous Attestation for Trusted Computing Platform 被引量:3
2
作者 HAO Liming SUN Xun YANG Shutang LU Songnian 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期101-104,共4页
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w... Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 展开更多
关键词 trusted computing trusted platform module direct anonymous attestation
下载PDF
The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study 被引量:2
3
作者 SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1641-1644,共4页
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cry... Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system. 展开更多
关键词 trusted computing trusted platform module (TPM) key management CREDENTIAL
下载PDF
TPM Context Manager and Dynamic Configuration Management for Trusted Virtualization Platform 被引量:1
4
作者 QIN Yu FENG Dengguo LIU Chunyong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期539-546,共8页
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen who... It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform. 展开更多
关键词 trusted computing TPM trusted platform module) trusted virtualization configuration representation configuration management
下载PDF
Merkle Tree Digital Signature and Trusted Computing Platform 被引量:1
5
作者 WANG Xiaofei HONG Fan TANG Xueming CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1467-1472,共6页
Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signatu... Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×10^10 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios. 展开更多
关键词 digital signature one-time signature Merkle tree trusted computing platform
下载PDF
基于隐私计算理论互联网行为定向广告感知对消费者隐私披露意愿的影响研究
6
作者 高丽华 宋一鸣 杨新雨 《现代广告》 2024年第17期57-65,共9页
算法和大数据技术在广告领域的应用给商家和消费者带来好处的同时,也衍生了精准传播下的隐私问题。随着隐私“脱敏”现象的出现,消费者对行为定向广告的感知与隐私披露意愿之间的关系成为各界关注的重点问题。本研究以隐私计算理论和平... 算法和大数据技术在广告领域的应用给商家和消费者带来好处的同时,也衍生了精准传播下的隐私问题。随着隐私“脱敏”现象的出现,消费者对行为定向广告的感知与隐私披露意愿之间的关系成为各界关注的重点问题。本研究以隐私计算理论和平台信任为出发点,构建行为定向广告感知对Z 世代消费者隐私披露影响的模型。实证结果表明,定向行为广告的感知有用性、感知可信性、感知趣味性、感知个性化和感知威胁性均对隐私披露意愿有显著影响;平台信任度在影响过程中起中介作用。基于研究结论,本文提出了行为定向广告传播效果的优化路径。 展开更多
关键词 行为定向广告 感知收益 感知风险 隐私披露 平台信任度
下载PDF
美食类消费平台用户体验对黏性的影响--基于心流体验和信任的双中介效应
7
作者 陆雯霞 胡婷 《江苏商论》 2024年第9期12-16,共5页
在数字经济时代,美食类消费平台逐渐成为消费者搜寻餐饮美食信息的重要渠道。促进平台经济健康发展,提升用户的美食消费体验,是赋能传统服务行业高质量发展的重要方式。本研究从体验视角出发,将用户体验划分为感官体验、交互体验和情感... 在数字经济时代,美食类消费平台逐渐成为消费者搜寻餐饮美食信息的重要渠道。促进平台经济健康发展,提升用户的美食消费体验,是赋能传统服务行业高质量发展的重要方式。本研究从体验视角出发,将用户体验划分为感官体验、交互体验和情感体验三个维度,并以信任和心流体验为中介变量检验用户黏性的影响机制。研究发现,用户体验通过信任和心流体验间接影响用户黏性;但交互体验未对心流体验产生影响;感官体验和情感体验对心流体验产生正向影响。研究结论为美食类消费平台提高了用户黏性、提升用户保有率提供对策和建议。 展开更多
关键词 心流体验 用户黏性 美食类消费平台 信任
下载PDF
基于IPFS和区块链技术的电力安全交易平台研究
8
作者 凌治 杨明 余江银 《信息网络安全》 CSCD 北大核心 2024年第6期968-976,共9页
近年来,大量新能源主体接入电力交易平台,核心业务数据量激增,导致当前集中式电力交易平台运行压力过大、数据不安全、交易不透明等问题。区块链本质上是具有去中心化特征的分布式账本,具有难以篡改、安全性高等特征。星际文件系统(Inte... 近年来,大量新能源主体接入电力交易平台,核心业务数据量激增,导致当前集中式电力交易平台运行压力过大、数据不安全、交易不透明等问题。区块链本质上是具有去中心化特征的分布式账本,具有难以篡改、安全性高等特征。星际文件系统(Inter Planetary File System,IPFS)在区块链中的应用可以减小区块链存储的数据量,具有文件去重功能,可有效避免中心化存储存在的一些安全问题和限制。文章结合两者特点,提出一种基于IPFS和区块链技术的电力安全交易平台模型,对数据存储进行优化并建立市场信用机制。仿真实验表明,该模型能够有效缓解物理节点存储压力、提升系统运行效率、有效量化市场主体信用。 展开更多
关键词 电力安全交易平台 区块链 IPFS 分布式 信任评估
下载PDF
基于Trustzone的强安全需求环境下可信代码执行方案 被引量:20
9
作者 张英骏 冯登国 +1 位作者 秦宇 杨波 《计算机研究与发展》 EI CSCD 北大核心 2015年第10期2224-2238,共15页
针对工业4.0等具有强安全需求、计算功能相对固定的新型信息化应用场景,基于白名单思想提出了1种移动嵌入式平台可信代码执行方案.利用ARM Trustzone硬件隔离技术构建可信执行环境,结合ARM虚拟内存保护机制,构造内核飞地,确保系统监控... 针对工业4.0等具有强安全需求、计算功能相对固定的新型信息化应用场景,基于白名单思想提出了1种移动嵌入式平台可信代码执行方案.利用ARM Trustzone硬件隔离技术构建可信执行环境,结合ARM虚拟内存保护机制,构造内核飞地,确保系统监控模块无法被不可信内核篡改或绕过.以此为基础为可信进程提供可执行文件完整性、运行时代码完整性、控制流完整性3种层次的白名单保护,确保设备只能执行符合白名单策略的授权代码.通过构建通信客户端进程与Trustzone安全世界的安全共享内存区,利用Trustzone对外设中断事件的控制能力构建可信时钟中断源,确保Trustzone安全世界与中控服务器通信的隐私性、不可屏蔽性.在此基础上设计安全的白名单更新与平台状态证明协议.在真实设备上实现了原型系统,实验结果证明了该方案的安全性和较为理想的运行效率. 展开更多
关键词 白名单 可信代码执行 trustzone技术 可信执行环境 内核飞地 平台状态证明
下载PDF
激励与治理:社会认知视角下平台型媒体的媒介信任机制——基于身份认同的中介效应实证
10
作者 赵梓昕 臧志彭 《科学与管理》 2024年第2期82-91,共10页
平台型媒体媒介信任影响机制鲜有实证研究支撑,其中多数研究从媒介理论出发,对社会认知视角关注不足。媒介信任作为一种个体行为,是个体在调整对自身和环境认知的基础上能动反思,持续建构的结果。社会认知理论能够有效预测个体行为,提... 平台型媒体媒介信任影响机制鲜有实证研究支撑,其中多数研究从媒介理论出发,对社会认知视角关注不足。媒介信任作为一种个体行为,是个体在调整对自身和环境认知的基础上能动反思,持续建构的结果。社会认知理论能够有效预测个体行为,提出“三元交互”模型,并重视个体的感知与能动反应,为媒介信任研究提供了新的视角。基于社会认知理论,通过全网音视图文各类平台用户的问卷抽样调查数据,分析平台型媒体媒介信任影响机制和路径,重点考察个人激励与平台治理的直接作用和用户身份认同的中介作用。研究发现:个人激励与平台治理对媒介信任具有显著的正向影响,身份认同对媒介信任同样具有正向影响,同时身份认同具有部分中介效应。该研究启示媒介信任行为与个体和环境紧密相关,不仅要关注媒介信任的影响机制,更要基于用户思维建立激励模式,通过优化过滤机制加强平台治理,内外合力探索完善针对性的媒介信任建立体系。 展开更多
关键词 平台型媒体 社会认知理论 媒介信任 个人激励 平台治理 身份认同
下载PDF
论数字出版产业平台的数据合规与算法信任
11
作者 杨旦修 《编辑之友》 北大核心 2024年第8期47-53,共7页
作为新型生产要素的数据是出版产业平台数字化的物质基础,算法则是出版产业平台数字化的生产性核心力量。通过对数据的高效采集、清洗、分类与集成,可加快推进出版产业数字化进程,实现数字出版产业平台的全流程数据化和算法化。文章指出... 作为新型生产要素的数据是出版产业平台数字化的物质基础,算法则是出版产业平台数字化的生产性核心力量。通过对数据的高效采集、清洗、分类与集成,可加快推进出版产业数字化进程,实现数字出版产业平台的全流程数据化和算法化。文章指出,可以数据合规、算法信任为目标,调节数字出版产业平台中的数据要素与数据合规矛盾以及算法生产与算法信任的冲突问题,共同促进数字出版新质生产力构建,以数据合规与算法信任的价值耦合机制助推数字出版产业平台发展迈向深水区。 展开更多
关键词 数字出版产业 出版平台 数据合规 算法信任 价值耦合
下载PDF
智能网联汽车数据流通技术研究
12
作者 王磊 《计算机应用文摘》 2024年第13期121-124,128,共5页
为深入研究智能网联汽车数据流通技术,文章结合某具体项目案例,首先探讨了基于区块链和隐私计算技术构建的可信数据空间框架,其次阐述了数据流通中存在的问题及其解决方法,包括数据权属问题、数据安全问题以及利益分配问题等,最后分析... 为深入研究智能网联汽车数据流通技术,文章结合某具体项目案例,首先探讨了基于区块链和隐私计算技术构建的可信数据空间框架,其次阐述了数据流通中存在的问题及其解决方法,包括数据权属问题、数据安全问题以及利益分配问题等,最后分析了具体的系统架构设计方案,涵盖区块链、智能合约、数据网关和隐私计算等部分。 展开更多
关键词 智能网联汽车 数据流通平台 可信数据空间 区块链技术 隐私计算技术
下载PDF
“互联网+”校园家教兼职平台的构建与研究
13
作者 王含宇 陈畅 王长峰 《移动信息》 2024年第2期160-162,共3页
文中首先介绍了“互联网+”校园家教兼职平台的意义,包括提供便捷的家教信息发布和匹配机制、建立信用评价体系、提供在线教学工具等。其次,探讨了平台的设计与实现,包括用户注册与认证、家教信息发布与搜索、在线交流与学习工具的开发... 文中首先介绍了“互联网+”校园家教兼职平台的意义,包括提供便捷的家教信息发布和匹配机制、建立信用评价体系、提供在线教学工具等。其次,探讨了平台的设计与实现,包括用户注册与认证、家教信息发布与搜索、在线交流与学习工具的开发等。最后,对平台的运营与管理进行了分析和总结,并提出了进一步的改进和发展方向。通过构建“互联网+”校园家教兼职平台,可以更好地满足家长和学生的家教需求,提高家教行业的效率和质量,促进教育资源的共享和优化利用。 展开更多
关键词 互联网+ 校园家教 兼职平台 合作平台 互信机制
下载PDF
考虑企业多种属性的共享制造平台供需双边匹配模型研究
14
作者 王莉静 马志鑫 徐梦杰 《计算机集成制造系统》 EI CSCD 北大核心 2024年第9期3299-3309,共11页
为了能以最低成本降低共享制造供需主体的交易风险,在对共享制造供需主体信誉的衡量上,运用基于滑动时间窗口的实时信任度度量方法,以综合考虑共享制造供需双方的局部声誉及全局声誉,进而求得更加精准的信誉度;此外为了促进共享制造供... 为了能以最低成本降低共享制造供需主体的交易风险,在对共享制造供需主体信誉的衡量上,运用基于滑动时间窗口的实时信任度度量方法,以综合考虑共享制造供需双方的局部声誉及全局声誉,进而求得更加精准的信誉度;此外为了促进共享制造供需主体的长久交易,在现有共享制造供需双边满意度评价指标体系中加入企业社会责任(CSR)相关细分指标,以考虑其对利益相关者的责任履行程度;综合共享制造供需双方的实时信任度、服务属性任务属性及CSR属性匹配度,建立多目标规划模型,并求解匹配结果。通过实例运算得到最优匹配方案,从而证明了该方法的可行性和有效性,并与仅考虑实时信任度、仅考虑CSR、上述两者均不考虑的模型进行比较,证明了所提模型的优势。 展开更多
关键词 共享制造平台 双边匹配 实时信任度 企业社会责任 满意度
下载PDF
A Behavior-Based Remote Trust Attestation Model 被引量:10
15
作者 ZHANG Huanguo WANG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1819-1822,共4页
While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of runni... While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model. 展开更多
关键词 remote attestation trusted computing trusted platform behavior monitoring agent behavior tree
下载PDF
关键意见消费者特性对社交媒体平台Z世代消费者购买意愿的影响研究
16
作者 刘薇 《山东青年政治学院学报》 2024年第4期80-89,共10页
基于Z世代消费者逐渐发展为社交媒体平台消费市场新兴主力军的背景,深入探讨关键意见消费者特性对Z世代购买意愿的影响机制。首先基于信任理论提出关键意见消费者的真实性、专业性、责任感三个特性;其次构建了“关键意见消费者特性——... 基于Z世代消费者逐渐发展为社交媒体平台消费市场新兴主力军的背景,深入探讨关键意见消费者特性对Z世代购买意愿的影响机制。首先基于信任理论提出关键意见消费者的真实性、专业性、责任感三个特性;其次构建了“关键意见消费者特性——信任——Z世代消费者购买意愿”理论模型;最后在问卷调查的基础上,运用结构方程模型对209份有效问卷样本进行假设验证。结果表明:关键意见消费者特性、感知信任显著影响Z世代社交媒体平台购买意愿,其中真实性影响最大;感知信任在关键意见消费者特性和Z世代社交媒体平台消费者购买意愿之间起到中介作用,即这些特性通过影响感知信任来间接影响购买意愿。这不仅为社交媒体营销领域提供了新的理论视角,还为培养关键意见消费者提供了实践指导。 展开更多
关键词 关键意见消费者特性 感知信任 Z世代 社交媒体平台 购买意愿
下载PDF
Implementing Operating System Support for Extended Trusted Path in TPM-Capable Environments 被引量:3
17
作者 SHI Wenchang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1493-1497,共5页
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of truste... Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems. 展开更多
关键词 operating system trusted path trusted platform module (TPM) trusted software
下载PDF
An Improved Grid Security Infrastructure by Trusted Computing 被引量:3
18
作者 YAN Fei ZHANG Huanguo +3 位作者 SUN Qi SHEN Zhidong ZHANG Liqiang QIANG Weizhong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1805-1808,共4页
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled ... Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment. 展开更多
关键词 trusted computing grid computing grid security trusted platform module
下载PDF
Modeling Trusted Computing 被引量:3
19
作者 CHEN Shuyi WEN Yingyou ZHAO Hong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1507-1510,共4页
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation... In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. 展开更多
关键词 trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic
下载PDF
Cyber-Physical-Social System Between a Humanoid Robot and a Virtual Human Through a Shared Platform for Adaptive Agent Ecology 被引量:3
20
作者 S. M. Mizanoor Rahman 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期190-203,共14页
Two artificial agents(a humanoid robot and a virtual human) are enriched with various similar intelligence,autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physica... Two artificial agents(a humanoid robot and a virtual human) are enriched with various similar intelligence,autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physical-social system(CPSS) through a shared communication platform to create a social ecology. In the ecology, the agents collaborate(assist each other) to perform a real-world task(search for a hidden object)for the benefits of humans. A robot-virtual human bilateral trust model is derived and a real-time trust measurement method is developed. The role of taking initiative in the collaboration is switched between the agents following a finite state machine model triggered by bilateral trust, which results in a mixedinitiative collaboration. A scheme is developed to evaluate the performance of the agents in the ecology through the CPSS.The results show that the robot and the virtual human perform satisfactorily in the collaboration through the CPSS. The results thus prove the effectiveness of the real-world ecology between artificial agents of heterogeneous realities through a shared platform based on trust-triggered mixed-initiatives. The results can help develop adaptive social ecology comprising intelligent agents of heterogeneous realities to assist humans in various tasks through collaboration between the agents in the form of a CPSS. 展开更多
关键词 Adaptive agent ecology assisted living cyberphysical-social system(CPSS) humanoid robot(HR) smart homes social interaction virtual human(VH) shared platform trust
下载PDF
上一页 1 2 28 下一页 到第
使用帮助 返回顶部