期刊文献+
共找到57篇文章
< 1 2 3 >
每页显示 20 50 100
Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things
1
作者 Zhaobin Li Xiantao Liu +1 位作者 Nan Zhang Zhanzhen Wei 《Computers, Materials & Continua》 SCIE EI 2024年第9期3835-3854,共20页
The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during informati... The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance. 展开更多
关键词 IIoT blockchain CERTIFICATELESS cross-domain authentication
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
2
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture
3
作者 Yi-Bo Cao Xiu-Bo Chen +6 位作者 Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2813-2827,共15页
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ... Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography. 展开更多
关键词 cross-domain identity authentication lattice-based cryptography blockchain hashed time-locked contract
下载PDF
SwinFusion: Cross-domain Long-range Learning for General Image Fusion via Swin Transformer 被引量:31
4
作者 Jiayi Ma Linfeng Tang +3 位作者 Fan Fan Jun Huang Xiaoguang Mei Yong Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第7期1200-1217,共18页
This study proposes a novel general image fusion framework based on cross-domain long-range learning and Swin Transformer,termed as SwinFusion.On the one hand,an attention-guided cross-domain module is devised to achi... This study proposes a novel general image fusion framework based on cross-domain long-range learning and Swin Transformer,termed as SwinFusion.On the one hand,an attention-guided cross-domain module is devised to achieve sufficient integration of complementary information and global interaction.More specifically,the proposed method involves an intra-domain fusion unit based on self-attention and an interdomain fusion unit based on cross-attention,which mine and integrate long dependencies within the same domain and across domains.Through long-range dependency modeling,the network is able to fully implement domain-specific information extraction and cross-domain complementary information integration as well as maintaining the appropriate apparent intensity from a global perspective.In particular,we introduce the shifted windows mechanism into the self-attention and cross-attention,which allows our model to receive images with arbitrary sizes.On the other hand,the multi-scene image fusion problems are generalized to a unified framework with structure maintenance,detail preservation,and proper intensity control.Moreover,an elaborate loss function,consisting of SSIM loss,texture loss,and intensity loss,drives the network to preserve abundant texture details and structural information,as well as presenting optimal apparent intensity.Extensive experiments on both multi-modal image fusion and digital photography image fusion demonstrate the superiority of our SwinFusion compared to the state-of-theart unified image fusion algorithms and task-specific alternatives.Implementation code and pre-trained weights can be accessed at https://github.com/Linfeng-Tang/SwinFusion. 展开更多
关键词 cross-domain long-range learning image fusion Swin transformer
下载PDF
Context Information and Fragments Based Cross-Domain Word Segmentation 被引量:8
5
作者 Huang Degen Tong Deqin 《China Communications》 SCIE CSCD 2012年第3期49-57,共9页
A new joint decoding strategy that combines the character-based and word-based conditional random field model is proposed.In this segmentation framework,fragments are used to generate candidate Out-of-Vocabularies(OOV... A new joint decoding strategy that combines the character-based and word-based conditional random field model is proposed.In this segmentation framework,fragments are used to generate candidate Out-of-Vocabularies(OOVs).After the initial segmentation,the segmentation fragments are divided into two classes as "combination"(combining several fragments as an unknown word) and "segregation"(segregating to some words).So,more OOVs can be recalled.Moreover,for the characteristics of the cross-domain segmentation,context information is reasonably used to guide Chinese Word Segmentation(CWS).This method is proved to be effective through several experiments on the test data from Sighan Bakeoffs 2007 and Bakeoffs 2010.The rates of OOV recall obtain better performance and the overall segmentation performances achieve a good effect. 展开更多
关键词 cross-domain CWS Conditional Ran-dem Fields(CRFs) joint decoding context variables segmentation fragments
下载PDF
FedCDR:Privacy-preserving federated cross-domain recommendation 被引量:2
6
作者 Dengcheng Yan Yuchuan Zhao +2 位作者 Zhongxiu Yang Ying Jin Yiwen Zhang 《Digital Communications and Networks》 SCIE CSCD 2022年第4期552-560,共9页
Cross-Domain Recommendation(CDR)aims to solve data sparsity and cold-start problems by utilizing a relatively information-rich source domain to improve the recommendation performance of the data-sparse target domain.H... Cross-Domain Recommendation(CDR)aims to solve data sparsity and cold-start problems by utilizing a relatively information-rich source domain to improve the recommendation performance of the data-sparse target domain.However,most existing approaches rely on the assumption of centralized storage of user data,which undoubtedly poses a significant risk of user privacy leakage because user data are highly privacy-sensitive.To this end,we propose a privacy-preserving Federated framework for Cross-Domain Recommendation,called FedCDR.In our method,to avoid leakage of user privacy,a general recommendation model is trained on each user's personal device to obtain embeddings of users and items,and each client uploads weights to the central server.The central server then aggregates the weights and distributes them to each client for updating.Furthermore,because the weights implicitly contain private information about the user,local differential privacy is adopted for the gradients before uploading them to the server for better protection of user privacy.To distill the relationship of user embedding between two domains,an embedding transformation mechanism is used on the server side to learn the cross-domain embedding transformation model.Extensive experiments on real-world datasets demonstrate that ourmethod achieves performance comparable with that of existing data-centralized methods and effectively protects user privacy. 展开更多
关键词 cross-domain recommendation Federated learning Privacy preserving
下载PDF
Achieving Consistence for Cross-Domain WAN Control in Software-Defined Networks 被引量:2
7
作者 ZHOU Boyang WU Chunming +3 位作者 GAO Wen HONG Xiaoyan JIANG Ming CHEN Shuangxi 《China Communications》 SCIE CSCD 2015年第10期136-146,共11页
When applying Software-Defined Networks(SDN) to WANs,the SDN flexibility enables the cross-domain control to achieve a better control scalability.However,the control consistence is required by all the cross-domain ser... When applying Software-Defined Networks(SDN) to WANs,the SDN flexibility enables the cross-domain control to achieve a better control scalability.However,the control consistence is required by all the cross-domain services,to ensure the data plane configured in consensus for different domains.Such consistence process is complicated by potential failure and errors of WANs.In this paper,we propose a consistence layer to actively and passively snapshot the cross-domain control states,to reduce the complexities of service realizations.We implement the layer and evaluate performance in the PlanetLab testbed for the WAN emulation.The testbed conditions are extremely enlarged comparing to the real network.The results show its scalability,reliability and responsiveness in dealing with the control dynamics.In the normalized results,the active and passive snapshots are executed with the mean times of 1.873 s and 105 ms in135 controllers,indicating its readiness to be used in the real network. 展开更多
关键词 software-defined networking distributed control plane cross-domain control
下载PDF
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management 被引量:1
8
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWIM) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
Exploration on the Frontiers of Flexible and Deformable Cross-Domain Intelligent Flight 被引量:3
9
作者 BAO Weimin LüXiaozhou +4 位作者 BAI Guanghui LI Xiaoping LIU Yanmin BAI Bowen SHI Yaoguang 《Aerospace China》 2021年第1期5-11,共7页
As human aeronautic and aerospace technology continues to prosper and the aerial flight space domain further expands,traditional fixed-shape air vehicles have been confronted with difficulties in satisfying complex mi... As human aeronautic and aerospace technology continues to prosper and the aerial flight space domain further expands,traditional fixed-shape air vehicles have been confronted with difficulties in satisfying complex missions in cross-domain scenarios.Owing to their flexible and deformable appearance,morphing air vehicles are expected to realize cross-domain intelligent flight,thus emerging as the most subversive strategic development trend and research focus in aeronautic and aerospace fields.This paper primarily reviews the research background and challenges of flexible and deformable cross-domain intelligent flight,proposing a corresponding research framework and mode as well as exploring the scientific issues and state-of-the-art solutions,where key research progress is introduced.The explorations covered in this paper also provide ideas and directions for the study of deformable cross-domain intelligent flight,which has critical scientific significance in promoting the study itself. 展开更多
关键词 cross-domain flight FLEXIBLE INTELLIGENT deformable configuration
下载PDF
Cross-Domain Data Traceability Mechanism Based on Blockchain
10
作者 Shoucai Zhao Lifeng Cao +2 位作者 Jinhui Li Jiling Wan Jinlong Bai 《Computers, Materials & Continua》 SCIE EI 2023年第8期2531-2549,共19页
With the application and development of blockchain technology,many problems faced by blockchain traceability are gradually exposed.Such as cross-chain information collaboration,data separation and storage,multisystem,... With the application and development of blockchain technology,many problems faced by blockchain traceability are gradually exposed.Such as cross-chain information collaboration,data separation and storage,multisystem,multi-security domain collaboration,etc.To solve these problems,it is proposed to construct trust domains based on federated chains.The public chain is used as the authorization chain to build a cross-domain data traceability mechanism applicable to multi-domain collaboration.First,the architecture of the blockchain cross-domain model is designed.Combined with the data access strategy and the decision mechanism,the open and transparent judgment of cross-domain permission and cross-domain identity authentication is realized.And the public chain consensus node election mechanism is realized based on PageRank.Then,according to the characteristics of a nonsingle chain structure in the process of data flow,a data retrievalmechanism based on a Bloom filter is designed,and the cross-domain traceability algorithm is given.Finally,the safety and effectiveness of the traceability mechanism are verified by security evaluation and performance analysis. 展开更多
关键词 cross-domain data traceability blockchain bloom filter
下载PDF
A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification
11
作者 Yao Wang Yubo Wang +2 位作者 Zhenhu Ning Sadaqat ur Rehman Muhammad Waqas 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期981-996,共16页
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo... Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneous and dynamic distributed Internet of things environment between different Internet of things.There is a wide demand for cooperation between equipment and management institutions in the smart city.Therefore,it is necessary to establish a trust mechanism to promote cooperation,and based on this,prevent data disorder caused by the interaction between honest terminals and malicious temminals.However,most of the existing research on trust mechanism is divorced from the Internet of things environment,and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of hings devices,resuling in the fact that the research on abstract trust trust mechanism cannot be directly applied to the Internet of things;On the other hand,various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not considered.Aiming at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals,a cross domain trust model(CDTM)based on self-authentication is proposed.Unlike most trust models,this model uses self-certified trust.The cross-domain process of internet of things(IoT)terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain interaction.At the same time,in order to alleviate the collision attack and improve the accuracy of trust evaluation,the overall trust value is calculated by comprehensively considering the quantity weight,time attenuation weight and similarity weight.Finally,the simulation results show that CDTM has good anti collusion attack ability.The success rate of malicious interaction will not increase significantly.Compared with other models,the resource consumption of our proposed model is significantly reduced. 展开更多
关键词 Smart city cross-domain trust model self-certification trust evaluation
下载PDF
BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks
12
作者 Fengting Luo Ruwei Huang Yuyue Chen 《Computers, Materials & Continua》 SCIE EI 2023年第11期1815-1835,共21页
Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnesse... Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme. 展开更多
关键词 cross-domain authentication blockchain smart parks Certificate Authority(CA) distributed collaboration Internet of Things(IoT)
下载PDF
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
13
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 cross-domain authentication trust evaluation autoencoder
下载PDF
A New Solution to Intrusion Detection Systems Based on Improved Federated-Learning Chain
14
作者 Chunhui Li Hua Jiang 《Computers, Materials & Continua》 SCIE EI 2024年第6期4491-4512,共22页
In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of enterprises.With systems spanning various sectors of enterprises geographically dispersed... In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of enterprises.With systems spanning various sectors of enterprises geographically dispersed,the necessity for seamless information exchange has surged significantly.The existing cross-domain solutions are challenged by such issues as insufficient security,high communication overhead,and a lack of effective update mechanisms,rendering them less feasible for prolonged application on resource-limited devices.This study proposes a new cross-domain collaboration scheme based on federated chains to streamline the server-side workload.Within this framework,individual nodes solely engage in training local data and subsequently amalgamate the final model employing a federated learning algorithm to uphold enterprise systems with efficiency and security.To curtail the resource utilization of blockchains and deter malicious nodes,a node administration module predicated on the workload paradigm is introduced,enabling the release of surplus resources in response to variations in a node’s contribution metric.Upon encountering an intrusion,the system triggers an alert and logs the characteristics of the breach,facilitating a comprehensive global update across all nodes for collective defense.Experimental results across multiple scenarios have verified the security and effectiveness of the proposed solution,with no loss of its recognition accuracy. 展开更多
关键词 cross-domain collaboration blockchain federated learning contribution value node management release slack resources
下载PDF
Learning Sequential and Structural Dependencies Between Nucleotides for RNA N6-Methyladenosine Site Identification
15
作者 Guodong Li Bowei Zhao +4 位作者 Xiaorui Su Dongxu Li Yue Yang Zhi Zeng Lun Hu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第10期2123-2134,共12页
N6-methyladenosine(m6A)is an important RNA methylation modification involved in regulating diverse biological processes across multiple species.Hence,the identification of m6A modification sites provides valuable insi... N6-methyladenosine(m6A)is an important RNA methylation modification involved in regulating diverse biological processes across multiple species.Hence,the identification of m6A modification sites provides valuable insight into the biological mechanisms of complex diseases at the post-transcriptional level.Although a variety of identification algorithms have been proposed recently,most of them capture the features of m6A modification sites by focusing on the sequential dependencies of nucleotides at different positions in RNA sequences,while ignoring the structural dependencies of nucleotides in their threedimensional structures.To overcome this issue,we propose a cross-species end-to-end deep learning model,namely CR-NSSD,which conduct a cross-domain representation learning process integrating nucleotide structural and sequential dependencies for RNA m6A site identification.Specifically,CR-NSSD first obtains the pre-coded representations of RNA sequences by incorporating the position information into single-nucleotide states with chaos game representation theory.It then constructs a crossdomain reconstruction encoder to learn the sequential and structural dependencies between nucleotides.By minimizing the reconstruction and binary cross-entropy losses,CR-NSSD is trained to complete the task of m6A site identification.Extensive experiments have demonstrated the promising performance of CR-NSSD by comparing it with several state-of-the-art m6A identification algorithms.Moreover,the results of cross-species prediction indicate that the integration of sequential and structural dependencies allows CR-NSSD to capture general features of m6A modification sites among different species,thus improving the accuracy of cross-species identification. 展开更多
关键词 cross-domain reconstruction cross-species prediction N6-methyladenosine(m6A)modification site RNA sequence sequential and structural dependencies
下载PDF
基于区块链可信大数据人工智能的金融安全情报分析 被引量:65
16
作者 丁晓蔚 苏新宁 《情报学报》 CSSCI CSCD 北大核心 2019年第12期1297-1309,共13页
金融安全是国家安全的重要构成部分。2008年的金融危机危及全球,至今仍是金融安全方面极具价值的研究样本。此次金融危机的原因很多,本文从情报分析视角进行反思。从数据和信息角度看,数据不完整、不完善、不准确、支离破碎、不可信、... 金融安全是国家安全的重要构成部分。2008年的金融危机危及全球,至今仍是金融安全方面极具价值的研究样本。此次金融危机的原因很多,本文从情报分析视角进行反思。从数据和信息角度看,数据不完整、不完善、不准确、支离破碎、不可信、不充分是危机的因由之一;"数据孤岛""信息孤岛"则妨碍了金融风险情报分析和金融危机预警,从一个方面助长了危机;从模型和方法角度看,数据质量影响模型质量(GIGO,垃圾进、垃圾出)。人类智慧和机器智能没能高效融合也是无力预警风险和抵制危机的重要原因之一。今天,区块链、大数据、人工智能+情报分析为金融风险防控提供了新思路。本文呼吁构建新型金融信息基础设施架构,在此基础上进一步提出了基于区块链的可信大数据和可信人工智能的理念,提出了新型金融(大数据)情报分析的理念。基于新型金融信息基础设施架构,基于可信大数据和可信人工智能新型情报分析,人类有望在防控金融风险、预警金融危机和维护金融安全等方面做得更好。 展开更多
关键词 情报分析 区块链 可信大数据 可信人工智能 金融安全 金融风险
下载PDF
RBAC模型的扩充及其应用 被引量:8
17
作者 蔡国永 林煜明 《计算机工程与应用》 CSCD 北大核心 2008年第3期228-233,共6页
RBAC(Role Based Access Control)是一种被广泛认可的信息系统访问安全规范管理模型,但RBAC访问安全规范模型如何与组织系统的业务过程规范模型融合,从而更有效地服务于可信业务协同系统的开发实践还值得进一步研究改进。在RBAC模型的... RBAC(Role Based Access Control)是一种被广泛认可的信息系统访问安全规范管理模型,但RBAC访问安全规范模型如何与组织系统的业务过程规范模型融合,从而更有效地服务于可信业务协同系统的开发实践还值得进一步研究改进。在RBAC模型的基础上,融合协同业务规范中的义务及奖惩元素,提出RBAO(Role Based Access and Obligation)模型。RBAO模型不仅能描述角色在组织中可拥有的访问权力,还能描述角色在组织中可能要承担的义务及义务违反时将受到的处罚。这使得RBAO模型更适合用于组织可信规范业务协同系统的管理建模与开发。以具体实例说明了基于RBAO模型的可信业务协同系统管理的分析与建模方法。 展开更多
关键词 访问控制 可信协同 交互义务 组织建模
下载PDF
数字金融时代的金融情报学:学科状况、学科内涵和研究方向 被引量:10
18
作者 丁晓蔚 《情报学报》 CSSCI CSCD 北大核心 2021年第11期1176-1194,共19页
金融情报学在情报学中的地位,实然与应然之间存在着很大差别,实然境况有待改变。其发展有待得到情报学专家更多关注。随着数字金融时代的来临,笔者倡导打造基于区块链可信大数据可信人工智能的下一代数字金融信息基础设施、体系架构、... 金融情报学在情报学中的地位,实然与应然之间存在着很大差别,实然境况有待改变。其发展有待得到情报学专家更多关注。随着数字金融时代的来临,笔者倡导打造基于区块链可信大数据可信人工智能的下一代数字金融信息基础设施、体系架构、计算范式、融合创新孵化平台。以数字金融为主要表征的下一代金融为金融情报学科提供了丰富的理论养料、实践经验和现实场景,并带来原创性学术研究的极佳机遇。金融情报学的原创理论和实践研究将反哺和助推下一代金融的蓬勃发展。下一代金融的发展需要金融情报学原创理论的支撑,金融情报学可以帮助回答未来金融创新应向何处去等问题。金融情报学可以围绕下一代金融构建其学科体系、学术体系、话语体系。在下一代金融背景下,金融情报学的学科内涵包括:对金融情报学科的基本认知;对有关金融的信息、知识和情报关系的处理;从情报学角度对金融风险进行监测和预警;在技术赋能的现实条件下,从情报学角度研究下一代金融;根据不断发展的现实需要进行金融情报研究。金融情报学的体系性架构包括:基础设施层面、理论基础层面、计算范式层面、应用实践层面。数字金融时代金融情报学的研究方向主要有:金融风险防控和金融安全,监管科技和金融秩序优化,金融领域守正与创新,中美主导的世界金融的联系与博弈。 展开更多
关键词 金融情报学 学科地位 学科内涵 数字金融 下一代金融 区块链 可信大数据 可信人工智能
下载PDF
一种支持可靠的语义互操作的本体管理方法 被引量:1
19
作者 何扬帆 何克清 王翀 《计算机工程与应用》 CSCD 北大核心 2006年第34期8-9,25,共3页
在语义网中,本体被广泛用于描述信息资源的含义。当交互的信息系统所使用的本体之间存在差异时,需要建立本体映射。本体映射是实现信息资源映射,以及信息系统互操作的前提。提出了一个支持可靠的语义互操作的方法,详细介绍了该方法的基... 在语义网中,本体被广泛用于描述信息资源的含义。当交互的信息系统所使用的本体之间存在差异时,需要建立本体映射。本体映射是实现信息资源映射,以及信息系统互操作的前提。提出了一个支持可靠的语义互操作的方法,详细介绍了该方法的基本思想,包含的信息模型,以及实现平台的基本架构。部分内容基于正在制定的国际标准ISO/IEC19763-3本体注册元模型。 展开更多
关键词 语义网 可靠的语义互操作 本体注册
下载PDF
基于 Multi-Agent 技术的供应链企业信任合作伙伴选择评估模型 被引量:4
20
作者 牛倩倩 陆秋琴 《物流技术》 北大核心 2013年第12期315-318,328,共5页
提出了基于Multi-Agent技术的供应链企业信任合作伙伴选择评价模型。在模型中,多Agent系统通过连接内外服务器对合作企业进行快速选择。通过不同Agent间相互沟通协调,实现了对合作伙伴信任的动态监督和评估。并且引入信任预警Agent,可... 提出了基于Multi-Agent技术的供应链企业信任合作伙伴选择评价模型。在模型中,多Agent系统通过连接内外服务器对合作企业进行快速选择。通过不同Agent间相互沟通协调,实现了对合作伙伴信任的动态监督和评估。并且引入信任预警Agent,可及时对合作过程中产生的信任风险发出警报,以提醒企业进行控制和采取必要的措施。通过实例表明,该模型对供应链信任合作伙伴的选择评估不仅快速而且有效,还能反映供应链合作关系的动态变化,具有一定的应用价值。 展开更多
关键词 Multi—Agent技术 选择评估 信任合作 供应链
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部