期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
CHC-TSCM:A Trustworthy Service Composition Method Based on an Improved CHC Genetic Algorithm
1
作者 曹步清 刘建勋 +3 位作者 Xiaoqing(Frank) LIU 李兵 周栋 康国胜 《China Communications》 SCIE CSCD 2013年第12期77-91,共15页
Trustworthy service composition is an extremely important task when service composition becomes infeasible or even fails in an environment which is open,autonomic,uncertain and deceptive.This paper presents a trustwor... Trustworthy service composition is an extremely important task when service composition becomes infeasible or even fails in an environment which is open,autonomic,uncertain and deceptive.This paper presents a trustworthy service composition method based on an improved Cross generation elitist selection,Heterogeneous recombination,Catacly-smic mutation(CHC) Trustworthy Service Composition Method(CHC-TSCM) genetic algorithm.CHCTSCM firstly obtains the total trust degree of the individual service using a trust degree measurement and evaluation model proposed in previous research.Trust combination and computation then are performed according to the structural relation of the composite service.Finally,the optimal trustworthy service composition is acquired by the improved CHC genetic algorithm.Experimental results show that CHC-TSCM can effectively solve the trustworthy service composition problem.Comparing with GODSS and TOCSS,this new method has several advantages:1) a higher service composition successrate;2) a smaller decline trend of the service composition success-rate,and 3) enhanced stability. 展开更多
关键词 QoS service trust model CHC gen-etic algorithm trustworthy service composition
下载PDF
Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud
2
作者 S.Priya R.S.Ponmagal 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1895-1907,共13页
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,num... Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance. 展开更多
关键词 Intrusion detection cloud systems trusted service support trusted network support trust user score trusted QoS support
下载PDF
Grid Services Trusted Authentication Algorithm Based on Image Trusted Root in Scale Space 被引量:2
3
作者 LIU Lizhao LIU Jian +2 位作者 ZHU Shunzhi LI Lin SUN Zhonghai 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期521-530,共10页
A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root is made as an image data.The grid entity is trusted in the soft platform when its feature of image... A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root is made as an image data.The grid entity is trusted in the soft platform when its feature of image root is entirely matched with that from the other entities' feature database in a scale space process.To recognize and detect the stable image root feature,the non-homogeneous linear expandable scale space is proposed.Focusing on relations between the scale parameter of the inhomogeneous Gaussian function terms and the space evolution of thermal diffusion homogeneous equations,three space evolution operators are constructed to exact and mark the feature from image root.Analysis and verification are carried on the new scale space,operators and the core of making decisions for grid entities certifications. 展开更多
关键词 grid computing trusted computing services trust AUTHENTICATION scale space diffusion equation evolution operator feature detection
原文传递
BCSE:Blockchain-Based Trusted Service Evaluation Model over Big Data 被引量:2
4
作者 Fengyin Li Xinying Yu +3 位作者 Rui Ge Yanli Wang Yang Cui Huiyu Zhou 《Big Data Mining and Analytics》 EI 2022年第1期1-14,共14页
The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure... The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions.Because of these characteristics,the blockchain is suitable for solving certain open problems in the service-oriented social network,where the unreliability of submitted reviews of service vendors can cause serious security problems.To solve the unreliability problems of submitted reviews,this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model.The new trusted service evaluation model consists of the blockchain-based identity authentication scheme,evaluation submission module,and evaluation publicity module.In the proposed evaluation model,only users who have successfully been authenticated can submit reviews to service vendors.The registration and authentication records of users’identity and the reviews for service vendors are all stored in the blockchain network.The security analysis shows that this model can ensure the credibility of users’reviews for service vendors,and other users can obtain credible reviews of service vendors via the review publicity module.The experimental results also show that the proposed model has a lower review submission delay than other models. 展开更多
关键词 social network trusted service evaluation model blockchain identity authentication
原文传递
DPTSV:A Dynamic Priority Task Scheduling Strategy for TSS Deadlock Based on Value Evaluation 被引量:2
5
作者 ZHAO Bo XIANG Shuang +1 位作者 AN Yang TAO Wei 《China Communications》 SCIE CSCD 2016年第1期161-175,共15页
This paper analyzes the threat of TCG Software Stack(TSS)/TCM Service Module(TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism.In addition,this paper puts forward a dynamic p... This paper analyzes the threat of TCG Software Stack(TSS)/TCM Service Module(TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism.In addition,this paper puts forward a dynamic priority task scheduling strategy based on value evaluation to handle this threat.The strategy is based on the implementation features of trusted hardware and establishes a multi-level ready queue.In this strategy,an algorithm for real-time value computing is also designed,and it can adjust the production curves of the real time value by setting parameters in different environment,thus enhancing its adaptability,which is followed by scheduling and algorithm description.This paper also implements the algorithm and carries out its performance optimization.Due to the experiment result from Intel NUC,it is shown that TSS based on advanced DPTSV is able to solve the problem of deadlock with no negative influence on performance and security in multi-user environment. 展开更多
关键词 TCG software stack/TCM service module deadlock multi-user trusted platform module real-time value
下载PDF
T-QoS-aware based parallel ant colony algorithm for services composition 被引量:2
6
作者 Lin Zhang Kaili Rao Ruchuan Wang 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2015年第5期1100-1106,共7页
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibili... In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibility as the weight of the quality of service, then calculates the trust service quality T-QoS for each service, making the service composition situated in a credible environment. Through the establishment on a per-service T-QoS initialization pheromone matrix, we can reduce the colony's initial search time. By modifying the pheromone updating rules and introducing two ant colonies to search from different angles in parallel,we can avoid falling into the local optimal solution, and quickly find the optimal combination of global solutions. Experiments show that our approach can combine high-quality services and the improvement of the operational success rate. Also, the convergence rate and the accuracy of optimal combination are improved. 展开更多
关键词 services composition trust service quality ant colonyalgorithm PARALLEL
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部