Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Chang-xiang SHEN"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 31-38 (2017)
In order to validate the service of cloud,an improved remote attestation scheme based on unbalanced hash tree of cloud platform was proposed.Double-layer unbalanced hash tree was built by introducing layer,original single tree was expanded to main tr
Externí odkaz:
https://doaj.org/article/647c642876ee49e19154671ad3de1f91
Publikováno v:
Tongxin xuebao, Vol 34, Pp 207-215 (2013)
There is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. I
Externí odkaz:
https://doaj.org/article/16f3dcb0182548528cd2ae16d9c77745
Publikováno v:
The Scientific World Journal, Vol 2014 (2014)
With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establi
Externí odkaz:
https://doaj.org/article/98462e1d50ad43c6989939adefa099d7
Publikováno v:
Applied Mathematics and Computation. 232:511-520
We study the stabilization the wave equations with variable coefficients in a bounded domain and nonlinear boundary feedback with time dependent delay. By the Riemannian geometry methods and a suitable assumption of delay, we obtain the exponential d
Publikováno v:
Journal of Mathematical Analysis and Applications. 405:148-155
Publikováno v:
Chinese Journal of Computers. 33:74-81
Publikováno v:
The Scientific World Journal, Vol 2014 (2014)
The Scientific World Journal
The Scientific World Journal
With a fast growing pervasive computing, especially cloud computing, the behaviour measurement is at the core and plays a vital role. A new behaviour measurement tailored for Multitenants in cloud computing is needed urgently to fundamentally establi
Publikováno v:
2009 International Conference on Machine Learning and Cybernetics.
Using root of trust to build Trusted Computing Platforms is a hot spot of information security research nowadays. According to trusted computing, this paper implements transitive trust in Java environment and builds a trusted Java platform. Malicious
Publikováno v:
2009 International Conference on Machine Learning and Cybernetics.
Now LDAP has become a widely used data storage method, while its write operation is very slow and authentication protocol is simple, so it is not suitable for huge system. This paper presents a new LDAP synchronization model based on Trusted Computin
Publikováno v:
2008 International Conference on Machine Learning and Cybernetics.
EDonkey network which had a large number of shared resources had become a popular P2P files sharing network. In order to analyzing the characteristics of eDonkey network, this paper provided a method which could prevent the crawler from being added t