期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Trusted dynamic level scheduling based on Bayes trust model 被引量:14
1
作者 WANG Wei ZENG GuoSun 《Science in China(Series F)》 2007年第3期456-469,共14页
A kind of trust mechanism-based task scheduling model was presented. Referring to the trust relationship models of social persons, trust relationship is built among Grid nodes, and the trustworthiness of nodes is eval... A kind of trust mechanism-based task scheduling model was presented. Referring to the trust relationship models of social persons, trust relationship is built among Grid nodes, and the trustworthiness of nodes is evaluated by utilizing the Bayes method. Integrating the trustworthiness of nodes into a Dynamic Level Scheduling (DLS) algorithm, the Trust-Dynamic Level Scheduling (Trust-DLS) algorithm is proposed. Theoretical analysis and simulations prove that the Trust-DLS algorithm can efficiently meet the requirement of Grid tasks in trust, sacrificing fewer time costs, and assuring the execution of tasks in a security way in Grid environment. 展开更多
关键词 Grid computing trustworthy scheduling Bayes method trustworthiness evaluation Trust-DLS
原文传递
An Approach of Trustworthy Software Design with Automatically Adapting Software Update
2
作者 LI Zhen TIAN Junfeng 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期391-398,共8页
In this paper, we merge software trustworthiness with software design and present an approach to trustworthy software design with an automatically adapting software update. First, software behavior and results can be ... In this paper, we merge software trustworthiness with software design and present an approach to trustworthy software design with an automatically adapting software update. First, software behavior and results can be expected and behavior states can be monitored when a software runs by introducing a trustworthy behavior trace on a software and inserting a checkpoint sensor at each checkpoint of the trustworthy software. Second, an updated approach of the trustworthy behavior trace for the software at the level of checkpoints is presented. The trustworthy behavior traces of the software for two versions can be merged adequately by constructing split points and merge points between two trustworthy behavior traces. Finally, experiments and analyses show that: (1) the software designed by our approach can detect and report the anomaly in a software automatically and effectively, so it has a higher ability of trustworthiness evaluation than the traditional software; and (2) our approach can realize the accurate update of the trustworthy behavior trace with a lower space overhead of checkpoints when the software updates. 展开更多
关键词 trustworthy software design software update software behavior trustworthiness evaluation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部