期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
1
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 trusted network behavioral predic-tive control SIMILARITY trust measurement
下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
2
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
下载PDF
Development of Trusted Network and Challenges It Faces 被引量:3
3
作者 Lin Chuang 1, Wang Yuanzhuo 1, Tian Liqin 1,2 (1. Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China 2. Department of Computer, North China Institute of Science and Technology, Beijing 101601, China) 《ZTE Communications》 2008年第1期13-17,共5页
As the information network plays a more and more important role globally, the traditional network theories and technologies, especially those related to network security, can no longer meet the network development req... As the information network plays a more and more important role globally, the traditional network theories and technologies, especially those related to network security, can no longer meet the network development requirements. Offering the system with secure and trusted services has become a new focus in network research. This paper first discusses the meaning of and aspects involved in the trusted network. According to this paper, the trusted network should be a network where the network’s and users’ behaviors and their results are always predicted and manageable. The trustworthiness of a network mainly involves three aspects: service provider, information transmission and terminal user. This paper also analyzes the trusted network in terms of trusted model for network/user behaviors, architecture of trusted network, service survivability and network manageability, which is designed to give ideas on solving the problems that may be faced in developing the trusted network. 展开更多
关键词 Development of trusted network and Challenges It Faces
下载PDF
A Trusted NUMFabric Algorithm for Congestion Price Calculation at the Internet-of-Things Datacenter 被引量:1
4
作者 Shan Chun Xiaolong Chen +1 位作者 Guoqiang Deng Hao Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第3期1203-1216,共14页
The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it... The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information.However,it is difficult to predict the congestion state of the link-end accurately at the source.In this paper,we presented an improved NUMFabric algorithm for calculating the overall congestion price.In the proposed scheme,the whole network structure had been obtained by the central control server in the Software Defined Network,and a kind of dual-hierarchy algorithm for calculating overall network congestion price had been demonstrated.In this scheme,the first hierarchy algorithm was set up in a central control server like Opendaylight and the guiding parameter B is obtained based on the intelligent data of global link state information.Based on the historical data,the congestion state of the network and the guiding parameter B is accurately predicted by the machine learning algorithm.The second hierarchy algorithm was installed in the Openflow link and the link price was calculated based on guiding parameter B given by the first algorithm.We evaluate this evolved NUMFabric algorithm in NS3,which demonstrated that the proposed NUMFabric algorithm could efficiently increase the link bandwidth utilization of cloud computing IoT datacenters. 展开更多
关键词 Internet of Things cloud computing intelligent data aggregation distributed optimization trusted network calculation
下载PDF
A Trusted Host’s Authentication Access and Control Model Faced on User Action 被引量:1
5
作者 ZHANG Miao XU Guoai HU Zhengming YANG Yixian 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1429-1432,共4页
The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on acc... The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization. 展开更多
关键词 trusted computing trusted network connection host control host authentication
下载PDF
Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud
6
作者 S.Priya R.S.Ponmagal 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1895-1907,共13页
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,num... Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance. 展开更多
关键词 Intrusion detection cloud systems trusted service support trusted network support trust user score trusted QoS support
下载PDF
Implicit Trust Based Context-Aware Matrix Factorization for Collaborative Filtering
7
作者 LI Ji-yun SUN Cai-qi 《Journal of Donghua University(English Edition)》 EI CAS 2016年第6期914-919,共6页
Matrix factorization (MF) has been proved to be a very effective technique for collaborative filtering ( CF), and hence has been widely adopted in today's recommender systems, Yet due to its lack of consideration... Matrix factorization (MF) has been proved to be a very effective technique for collaborative filtering ( CF), and hence has been widely adopted in today's recommender systems, Yet due to its lack of consideration of the users' and items' local structures, the recommendation accuracy is not fully satisfied. By taking the trusts among users' and between items' effect on rating information into consideration, trust-aware recommendation systems (TARS) made a relatively good performance. In this paper, a method of incorporating trust into MF was proposed by building user-based and item-based implicit trust network under different contexts and implementing two implicit trust-based context-aware MF (]TMF) models. Experimental results proved the effectiveness of the methods. 展开更多
关键词 matrix factorization(MF) collaborative filtering(CF) implicit trust network contex aware
下载PDF
Building trust networks in the absence of trust relations 被引量:2
8
作者 Xin WANG Ying WANG Jian-hua GUO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第10期1591-1600,共10页
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media platfo... User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media platforms.These issues pose a great challenge for predicting trust relations and further building trust networks. In this study,we investigate whether we can predict trust relations via a sparse learning model, and propose to build a trust network without trust relations using only pervasively available interaction data and homophily effect in an online world. In particular, we analyze the reliability of predicting trust relations by interaction behaviors, and provide a principled way to mathematically incorporate interaction behaviors and homophily effect in a novel framework,b Trust. Results of experiments on real-world datasets from Epinions and Ciao demonstrated the effectiveness of the proposed framework. Further experiments were conducted to understand the importance of interaction behaviors and homophily effect in building trust networks. 展开更多
关键词 Trust network Sparse learning Homophily effect Interaction behaviors
原文传递
Multikernel:Operating system solution to generalized functional safety 被引量:2
9
作者 Yijing Song Huasheng Dai +1 位作者 Jinhu Jiang Weihua Zhang 《Security and Safety》 2023年第2期30-43,共14页
With the trend of digitalization,intelligence,and networking sweeping the world,functional safety and cyber security are increasingly intertwined and overlapped,evolving into the issue of generalized functional safety... With the trend of digitalization,intelligence,and networking sweeping the world,functional safety and cyber security are increasingly intertwined and overlapped,evolving into the issue of generalized functional safety.Traditional system reliability technology and network defense technology cannot provide quantifiable design implementation theories and methods.As the cornerstone of software systems,operating systems in particular are in need of efficient safety assurance.The DHR architecture is a mature and comprehensive solution,and it is necessary to implement an OS-level DHR architecture,for which the multi-kernel operating system is a good carrier.The multi-kernel operating system takes the kernel as the processing scenario element and constructs redundancy,heterogeneity,and dynamism on the kernel,so it has the generalized robustness of the DHR architecture.This article analyzes the significance and requirements of OS-level DHR architecture,and systematically explains how the multi-kernel operating system responds to the requirements of OS-level DHR architecture by analyzing the technical routes of multi-kernel operating systems and develops an operating system solution idea for the generalized functionally safety. 展开更多
关键词 Metaverse New infrastructure Security base Highly trusted network trusted identiry trusted circulation of data
原文传递
Towards building a firm metaverse security base 被引量:1
10
作者 Anmin Li Xiaohui Yao +2 位作者 Haiying Gu Yungeng Zhang Yuan Chang 《Security and Safety》 2023年第2期57-71,共15页
The Metaverse is a significant field that is currently receiving considerable attention from both the industry and academia.The transformation of the Metaverse from science fiction to reality is being actively promote... The Metaverse is a significant field that is currently receiving considerable attention from both the industry and academia.The transformation of the Metaverse from science fiction to reality is being actively promoted by technology,industry,and capital.However,the development of the Metaverse is still in its early stages,and the system architecture and theoretical technology of the Metaverse are not yet mature.This paper provides a comprehensive analysis of the Metaverse and summarizes its holographic,omnipotent,multidimensional,and multifaceted characteristics.The development of the Metaverse is founded on the relevant infrastructure,and we elaborate on the primary components of the Metaverse infrastructure.Furthermore,we systematically summarize the security risks inherent in the Metaverse infrastructure.Based on this,we propose utilizing the system security technology concept to guide the construction of a Metaverse security protection system from various perspectives at each level of computing,cloud,network,digital assets,and terminals,in order to construct a secure foundation for addressing the Metaverse’s security risks and challenges. 展开更多
关键词 Metaverse New infrastructure Security base Highly trusted network trusted identiry trusted circulation of data
原文传递
A Confidence-based Consensus Model for Multi-Attribute Group Decision Making:Exploring the Bounded Trust Propagation and Personalized Adjustment Willingness
11
作者 Ling Pan Zeshui Xu 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2023年第4期483-513,共31页
Social trust network(STN)and minimum cost consensus(MCC)models have been widely used to address consensus issues in multi-attribute group decision-making(MAGDM)problems with limited resources.However,most researchers ... Social trust network(STN)and minimum cost consensus(MCC)models have been widely used to address consensus issues in multi-attribute group decision-making(MAGDM)problems with limited resources.However,most researchers have overlooked the decision maker‘(DMs)’confidence levels(CLs)and adjustment willingness implicit in their evaluations.To address these problems,this paper explores a confidence-based MCC model that considers DMs’adjustment willingness in the STN.The proposed model includes several modifications to the traditional trust propagation and consensus optimization models.Firstly,the improved method for measuring CLs of DMs and the confidence-based normalization approach are defined,respectively.Secondly,the bounded trust propagation operator is proposed,which considers the credibility of mediators to complete the STN.Thirdly,the identification rules based on the consensus index and CL are defined,and the MCC model with personalized cost functions and acceptable adjustment thresholds is built to automatically generate adjustment values for non-consensus DMs.Finally,a model to identify the non-cooperative behavior at the element level is established and the hybrid MCC model with persuasion strategies is provided.Finally,a case study is processed to verify the applicability of the proposed model,and comparison and sensitivity analysis are conducted to highlight its benefits. 展开更多
关键词 Confidence level social trust network bounded trust propagation minimum cost consensus models multi-attribute group decision making
原文传递
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment 被引量:5
12
作者 王玉峰 堀良彰 樱井幸一 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第1期129-140,共12页
Considering the fact that P2P (Peer-to-Peer) systems are self-organized and autonomous, social-control mechanism (like trust and reputation) is essential to evaluate the trustworthiness of participating peers and ... Considering the fact that P2P (Peer-to-Peer) systems are self-organized and autonomous, social-control mechanism (like trust and reputation) is essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest and malicious peer behaviors. So, naturally, we advocate that P2P systems that gradually act as an important information infrastructure should be multi-disciplinary research topic, and reflect certain features of our society. So, from economic and social perspective, this paper designs the incentive-compatible reputation feedback scheme based on well-known economic model, and characterizes the social features of trust network in terms of efficiency and cost. Specifically, our framework has two distinctive purposes: first, from high-level perspective, we argue trust system is a special kind of social network, and an accurate characterization of the structural properties of the network can be of fundamental importance to understand the dynamics of the system. Thus, inspired by the concept of weighted small-world, this paper proposes new measurements to characterize the social properties of trust system, that is, high global and local efficiency, and low cost; then, from relative low-level perspective, we argue that reputation feedback is a special kind of information, and it is not free. So, based on economic model, VCG (Vickrey-Clarke-Grove)-like reputation remuneration mechanism is proposed to stimulate rational peers not only to provide reputation feedback, but truthfully offer feedback. Furthermore, considering that trust and reputation is subjective, we classify the trust into functional trust and referral trust, and extend the referral trust to include two factors: similarity and truthfulness, which can efficiently reduce the trust inference error. The preliminary simulation results show the benefits of our proposal and the emergence of certain social properties in trust network. 展开更多
关键词 trust network economic and social property P2P incentive-compatible
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部