期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
TrustControl:Trusted Private Data Usage Control Based on Security Enhanced TrustZone
1
作者 Hong Lei Jun Li +5 位作者 Suozai Li Ming Huang Jieren Cheng Yirui Bai Xinman Luo Chao Liu 《Computers, Materials & Continua》 SCIE EI 2022年第12期5687-5702,共16页
The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,indivi... The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,individuals are becoming increasingly concerned about data misuse and leaks.To address these issues,in this paper,we propose TrustControl,a trusted data usage control system to control,process,and protect data usage without revealing privacy.A trusted execution environment(TEE)is exploited to process confidential user data.First of all,we design a secure and reliable remote attestation mechanism for ARM TrustZone,which can verify the security of the TEE platform and function code,thus guaranteeing data processing security.Secondly,to address the security problem that the raw data may be misused,we design a remote dynamic code injection method to regulate that data can only be processed for the expected purpose.Our solution focuses on protecting the sensitive data of the data owner and the function code of the data user to prevent data misuse and leakage.Furthermore,we implement the prototype system of TrustControl on TrustZone-enabled hardware.Real-world experiment results demonstrate that the proposed Trust-Control is secure and the performance overhead of introducing our prototype system is very low. 展开更多
关键词 TRUSTZONE data usage control PRIVACY SECURITY
下载PDF
DEVELOPMENT AND USAGE OF SIGNAL PR OCESSING AND SOUND SITIMULATING SYSTEM CONTROLLED BY COMPUTER
2
作者 Sun Wei,Li Xing-Qi,Jiang Si-Chang (Institute of Otolaryngology of PLA Department of Otolaryngology of General Hospital. Beijing, China) 《Chinese Journal of Biomedical Engineering(English Edition)》 1995年第2期103-104,共2页
In hearing physiological experiments and clinic tests,we need not only a signal processing system,but also a synchronous sound stimulator’ Most of stimulators we are now using are function generators which are indepe... In hearing physiological experiments and clinic tests,we need not only a signal processing system,but also a synchronous sound stimulator’ Most of stimulators we are now using are function generators which are independent to processing units,and can be controlled only by hand. Although some of them have ports through which they can be controlled by computer,but as they are designed for industrial aims,not for hearing research,most of them can’t generate the special waveforms we need. We use the TDT signal processing system and develop a software package have both usage. On the interface of the program we can control the sampling parameters and generate stimulating waveforms’ 展开更多
关键词 PR DEVELOPMENT AND usage OF SIGNAL PR OCESSING AND SOUND SITIMULATING SYSTEM controlLED BY COMPUTER
下载PDF
Context-Aware Usage-Based Grid Authorization Framework
3
作者 CUI Yongquan HONG Fan FU Cai 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1736-1740,共5页
Due to inherent heterogeneity, multi-domain characteristic and highly dynamic nature, authorization is a critical concern in grid computing. This paper proposes a general authorization and access control architecture,... Due to inherent heterogeneity, multi-domain characteristic and highly dynamic nature, authorization is a critical concern in grid computing. This paper proposes a general authorization and access control architecture, grid usage control (GUCON), for grid computing. It's based on the next generation access control mechanism usage control (UCON) model. The GUCON Framework dynamic grants and adapts permission to the subject based on a set of contextual information collected from the system environments; while retaining the authorization by evaluating access requests based on subject attributes, object attributes and requests. In general, GUCON model provides very flexible approaches to adapt the dynamically security request. GUCON model is being implemented in our experiment prototype. 展开更多
关键词 CONTEXT-AWARE access control usage control (UCON)
下载PDF
A Multi-Tenant Usage Access Model for Cloud Computing
4
作者 Zhengtao Liu Yun Yang +1 位作者 Wen Gu Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2020年第8期1233-1245,共13页
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated tha... Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants. 展开更多
关键词 Multi-tenant usage access control model cloud computing
下载PDF
A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology 被引量:2
5
作者 CHEN Lu ZHANG Huanguo +2 位作者 ZHANG Liqiang LI Song CAI Liang 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期523-527,共5页
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu... Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform. 展开更多
关键词 resource sharing trusted computing VIRTUALIZATION UCON usage control chain of trust
下载PDF
Connection Admission Control in ATM Networks Based on the Foreground and Background Neural Networks 被引量:1
6
作者 Ma Xudong Luee Tingjie and Liang Xiongjian(Department of Management Engineering Beijing University of Posts and Telecommunications,Beijing 100088, P.R.China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1996年第1期15-20,共6页
Connection Admission Control(CAC)in ATM networks is the set o/actions taken by the networkto decide whether to accept connection requests during the phase of call establishment or call re-negotiation.CAC is an integra... Connection Admission Control(CAC)in ATM networks is the set o/actions taken by the networkto decide whether to accept connection requests during the phase of call establishment or call re-negotiation.CAC is an integral part of the preventive congestion control in ATM networks whose aim is to ensurenetwork performance.The CAC algorithm has the characteristics of the multitude of control parameters,high degree of computation complexity and strong time restrictions.In this paper we present a CACmechanism featured by combination of foreground control and background learning which is based onneural networks having the capabilities of self-learning and high-Speed processing.A case study is given,after which we discuss the practicability of the proposed algorithm. 展开更多
关键词 s:connection admission control ATM networks neural networks usage parameter control
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部