The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on acc...The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.展开更多
In the field of civil engineering, magnetorheological fluid (MRF) damper-based semi-active control systems have received considerable attention for use in protecting structures from natural hazards such as strong ea...In the field of civil engineering, magnetorheological fluid (MRF) damper-based semi-active control systems have received considerable attention for use in protecting structures from natural hazards such as strong earthquakes and high winds. In this paper, the MRF damper-based semi-active control system is applied to a long-span spatially extended structure and its feasibility is discussed. Meanwhile, a _trust-region method based instantaneous optimal semi-active control algorithm (TIOC) is proposed to improve the performance of the semi-active control system in a multiple damper situation. The proposed TIOC describes the control process as a bounded constraint optimization problem, in which an optimal semi- active control force vector is solved by the trust-region method in every control step to minimize the structural responses. A numerical example of a railway station roof structure installed with MRF-04K dampers is presented. First, a modified Bouc- Wen model is utilized to describe the behavior of the selected MRF-04K damper. Then, two semi-active control systems, including the well-known clipped-optimal controller and the proposed TIOC controller, are considered. Based on the characteristics of the long-span spatially extended structure, the performance of the control system is evaluated under uniform earthquake excitation and travelling-wave excitation with different apparent velocities. The simulation results indicate that the MR fluid damper-based semi-active control systems have the potential to mitigate the responses of full-scale long-span spatially extended structures under earthquake hazards. The superiority of the proposed TIOC controller is demonstrated by comparing its control effectiveness with the clipped-optimal controller for several different cases.展开更多
The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this...The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.展开更多
Two limitations of current integrity measurement architectures are pointed out: (1) a reference value is required for every measured entity to verify the system states, as is impractical however; (2) malicious us...Two limitations of current integrity measurement architectures are pointed out: (1) a reference value is required for every measured entity to verify the system states, as is impractical however; (2) malicious user can forge proof of inexistent system states. This paper proposes a trustworthy integrity measurement architecture, BBACIMA, through enforcing behavior-based access control for trusted platform module (TPM). BBACIMA introduces a TPM reference monitor (TPMRM) to ensure the trustworthiness of integrity measurement. TPMRM enforces behavior-based access control for the TPM and is isolated from other entities which may be malicious. TPMRM is the only entity manipulating TPM directly and all PCR (platform configuration register) operation requests must pass through the security check of it so that only trusted processes can do measurement and produce the proof of system states. Through these mechanisms malicious user can not enforce attack which is feasible in current measurement architectures.展开更多
In order to solve such problems as lack of dynamic evaluation system in evaluation of quality and safety trust of dairy products,and weak awareness of prevention,it is necessary to introduce the statistical process co...In order to solve such problems as lack of dynamic evaluation system in evaluation of quality and safety trust of dairy products,and weak awareness of prevention,it is necessary to introduce the statistical process control into the quality and safety trust evaluation system of dairy products,and establish quality and safety trust early warning model for dairy products,so as to determine the control limit of control chart and carry out early warning according to eight criteria. According to the empirical results,the statistical process control is helpful for finding the hidden process risks and providing the necessary basis for enterprises taking positive measures to raise the confidence of consumers.展开更多
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ...PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.展开更多
为保障铁路系统的信息安全,文章提出一种铁路运行环境下可信根实体(Entity of Root of Trust,ERT)的软件化技术,在内核中实现强制访问控制功能,通过操作系统内核的修改或扩展,实现更为细粒度和强大的权限管理。同时考虑到轻量级场景下...为保障铁路系统的信息安全,文章提出一种铁路运行环境下可信根实体(Entity of Root of Trust,ERT)的软件化技术,在内核中实现强制访问控制功能,通过操作系统内核的修改或扩展,实现更为细粒度和强大的权限管理。同时考虑到轻量级场景下部分设备存在计算能力弱、存储空间有限和电源供应不稳定等问题,提出一种轻量级可信计算体系,最大程度满足可信计算要求。通过实施内核级的强制访问控制和轻量级的可信计算体系改造,缓解未知风险对关键信息基础设施的威胁,为铁路系统的安全性提供保障。展开更多
基金Supported by Specialized Research Fund for theDoctoral Programof Higher Education of China (20050013011)
文摘The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.
基金Supported by:National Science Fund for Distinguished Young Scholars of China Under Grant No. 50425824the National Natural Science Foundation of China Under Grant No.50578109,90715034 and 90715032
文摘In the field of civil engineering, magnetorheological fluid (MRF) damper-based semi-active control systems have received considerable attention for use in protecting structures from natural hazards such as strong earthquakes and high winds. In this paper, the MRF damper-based semi-active control system is applied to a long-span spatially extended structure and its feasibility is discussed. Meanwhile, a _trust-region method based instantaneous optimal semi-active control algorithm (TIOC) is proposed to improve the performance of the semi-active control system in a multiple damper situation. The proposed TIOC describes the control process as a bounded constraint optimization problem, in which an optimal semi- active control force vector is solved by the trust-region method in every control step to minimize the structural responses. A numerical example of a railway station roof structure installed with MRF-04K dampers is presented. First, a modified Bouc- Wen model is utilized to describe the behavior of the selected MRF-04K damper. Then, two semi-active control systems, including the well-known clipped-optimal controller and the proposed TIOC controller, are considered. Based on the characteristics of the long-span spatially extended structure, the performance of the control system is evaluated under uniform earthquake excitation and travelling-wave excitation with different apparent velocities. The simulation results indicate that the MR fluid damper-based semi-active control systems have the potential to mitigate the responses of full-scale long-span spatially extended structures under earthquake hazards. The superiority of the proposed TIOC controller is demonstrated by comparing its control effectiveness with the clipped-optimal controller for several different cases.
基金Supported by the National Natural Science Foun-dation of China (60363001 ,60373087 ,90104005 ,60473023)
文摘The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.
基金the National High Technology Research and Development Plan of China (2007AA01Z412)the National Key Technology R&D Program of China (2006BAH02A02)the National Natural Science Foundation of China (60603017)
文摘Two limitations of current integrity measurement architectures are pointed out: (1) a reference value is required for every measured entity to verify the system states, as is impractical however; (2) malicious user can forge proof of inexistent system states. This paper proposes a trustworthy integrity measurement architecture, BBACIMA, through enforcing behavior-based access control for trusted platform module (TPM). BBACIMA introduces a TPM reference monitor (TPMRM) to ensure the trustworthiness of integrity measurement. TPMRM enforces behavior-based access control for the TPM and is isolated from other entities which may be malicious. TPMRM is the only entity manipulating TPM directly and all PCR (platform configuration register) operation requests must pass through the security check of it so that only trusted processes can do measurement and produce the proof of system states. Through these mechanisms malicious user can not enforce attack which is feasible in current measurement architectures.
基金Supported by Program of Chongqing University of Arts and Sciences(Z2014JG14)Young Scholar Project of Humanities and Social Science Foundation of Ministry of Education(15XJC790002)
文摘In order to solve such problems as lack of dynamic evaluation system in evaluation of quality and safety trust of dairy products,and weak awareness of prevention,it is necessary to introduce the statistical process control into the quality and safety trust evaluation system of dairy products,and establish quality and safety trust early warning model for dairy products,so as to determine the control limit of control chart and carry out early warning according to eight criteria. According to the empirical results,the statistical process control is helpful for finding the hidden process risks and providing the necessary basis for enterprises taking positive measures to raise the confidence of consumers.
基金Supported by the National Tenth Five-rear Planfor Scientific and Technological Development of China (413160501)the National Natural Science Foundation of China (50477038)
文摘PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.
文摘为保障铁路系统的信息安全,文章提出一种铁路运行环境下可信根实体(Entity of Root of Trust,ERT)的软件化技术,在内核中实现强制访问控制功能,通过操作系统内核的修改或扩展,实现更为细粒度和强大的权限管理。同时考虑到轻量级场景下部分设备存在计算能力弱、存储空间有限和电源供应不稳定等问题,提出一种轻量级可信计算体系,最大程度满足可信计算要求。通过实施内核级的强制访问控制和轻量级的可信计算体系改造,缓解未知风险对关键信息基础设施的威胁,为铁路系统的安全性提供保障。