首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
The Study of Trustworthy Software Process Improvement Model 可信软件过程改进模型研究
Benhai Yu, Qing Wang, Ye Yang
Through analyzing the basic characters of Trustworthy Software, the index system of Trustworthy Software Process Measurement is set up, the correlation among Trustworthy Software, Trustworthy Process and Measurement Indexes is described formally, the model of Trustworthy Process Improvement and Measurement is introduced. Some instances researches show the model can not only estimate the trustworthy degree of software process, but also identify potential risk factors in software developing process, and provide trusty decision-making reference for software process improvement and risk prevention.
通过分析可信赖软件的基本特征,建立了可信赖软件过程度量指标体系,形式化描述了可信赖软件、可信赖过程和度量指标之间的关系,介绍了可信赖过程改进与度量模型。实例研究表明,该模型不仅可以估计软件过程的可信程度,还可以识别软件开发过程中的潜在风险因素,为软件过程改进和风险防范提供可信决策参考。
{"title":"The Study of Trustworthy Software Process Improvement Model","authors":"Benhai Yu, Qing Wang, Ye Yang","doi":"10.1109/NSWCTC.2009.338","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.338","url":null,"abstract":"Through analyzing the basic characters of Trustworthy Software, the index system of Trustworthy Software Process Measurement is set up, the correlation among Trustworthy Software, Trustworthy Process and Measurement Indexes is described formally, the model of Trustworthy Process Improvement and Measurement is introduced. Some instances researches show the model can not only estimate the trustworthy degree of software process, but also identify potential risk factors in software developing process, and provide trusty decision-making reference for software process improvement and risk prevention.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122427594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Two-Stage Blind Multiuser Detection for Ultra Wideband in a Realistic Indoor Channel 真实室内信道超宽带两级盲多用户检测
Zheng-qiang Wang, Ling-yuan Li, Lixin Song
A blind multiuser receiver is proposed for multiuser detection of UWB systems in a realistic indoor channel. The proposed blind multiuser receiver is based on the constant-modulus algorithm (CMA), which is known to provide satisfactory performances in a blind setting. In order to overcome the CMA interference capture problem typical of a multiuser scenario, we propose to adopt a two stage receiver: in the first stage, partial ISI and MA1 suppression is achieved by exploiting the desired user signature structure properties; in the second stage, based on CMA, the residual MAI and the ISI are removed, and the desired symbols are reliably recovered. Computer simulations show that, the proposed detector achieves good performances .
针对UWB系统在真实室内信道中的多用户检测问题,提出了一种盲多用户接收机。所提出的盲多用户接收机基于恒模算法(CMA),已知该算法在盲环境下提供令人满意的性能。为了克服多用户场景中典型的CMA干扰捕获问题,我们建议采用两阶段接收器:在第一阶段,通过利用所需的用户签名结构属性来实现部分ISI和MA1抑制;第二阶段,在CMA的基础上,去除残留的MAI和ISI,可靠地恢复所需的符号。计算机仿真结果表明,该检测器具有良好的检测性能。
{"title":"Two-Stage Blind Multiuser Detection for Ultra Wideband in a Realistic Indoor Channel","authors":"Zheng-qiang Wang, Ling-yuan Li, Lixin Song","doi":"10.1109/NSWCTC.2009.171","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.171","url":null,"abstract":"A blind multiuser receiver is proposed for multiuser detection of UWB systems in a realistic indoor channel. The proposed blind multiuser receiver is based on the constant-modulus algorithm (CMA), which is known to provide satisfactory performances in a blind setting. In order to overcome the CMA interference capture problem typical of a multiuser scenario, we propose to adopt a two stage receiver: in the first stage, partial ISI and MA1 suppression is achieved by exploiting the desired user signature structure properties; in the second stage, based on CMA, the residual MAI and the ISI are removed, and the desired symbols are reliably recovered. Computer simulations show that, the proposed detector achieves good performances .","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122951952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Mobile Web Presentation with Better User Experience 具有更好用户体验的新型移动Web演示
Yunpeng Xiao, Yang Tao, Qian Li
Mobile handheld device, as small screen, limited user interface and hardware power, can not browse web pages designed for PCs comfortably. By means of mobile web 2.0, a new mobile web presentation with better user experience is proposed. A thumbnail view of the original web page is firstly presented to mobile user. While mobile user browsing the thumbnail view page, moving his mouse pointer, the original block which the pointer is focusing will be gotten from the proxy asynchronously and zoomed in automatically. The mode does not charge the layout of the web page and make mobile user can browse specific web information block clearly and conveniently. Using the mode, mobile user’s behavior is very similar to PC user’s. Moreover, a prototype system and a set of evaluation experiments have been implemented to verify the scheme and show its values in both technical and economical viewpoints.
移动手持设备由于屏幕小,用户界面和硬件能力有限,无法舒适地浏览为pc设计的网页。基于移动web 2.0,提出了一种具有更好用户体验的移动web呈现方式。首先将原始网页的缩略图呈现给移动用户。移动用户在浏览缩略图视图页面时,移动鼠标指针,将从代理异步获取指针聚焦的原始块,并自动放大。该模式不占用网页的版面,使移动用户可以清晰、方便地浏览特定的网页信息块。使用该模式,移动用户的行为与PC用户的行为非常相似。并通过样机系统和一组评价实验对该方案进行了验证,显示了该方案在技术和经济上的价值。
{"title":"A New Mobile Web Presentation with Better User Experience","authors":"Yunpeng Xiao, Yang Tao, Qian Li","doi":"10.1109/NSWCTC.2009.333","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.333","url":null,"abstract":"Mobile handheld device, as small screen, limited user interface and hardware power, can not browse web pages designed for PCs comfortably. By means of mobile web 2.0, a new mobile web presentation with better user experience is proposed. A thumbnail view of the original web page is firstly presented to mobile user. While mobile user browsing the thumbnail view page, moving his mouse pointer, the original block which the pointer is focusing will be gotten from the proxy asynchronously and zoomed in automatically. The mode does not charge the layout of the web page and make mobile user can browse specific web information block clearly and conveniently. Using the mode, mobile user’s behavior is very similar to PC user’s. Moreover, a prototype system and a set of evaluation experiments have been implemented to verify the scheme and show its values in both technical and economical viewpoints.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case 基于协议的隐藏密钥恢复:IBE方法和IPSec案例
Rui-dan Su, XiangQuan Che, Shaofeng Fu, Longhai Li, Lihua Zhou
Goh has proposed a protocol-based mechanism which can add key recovery to existing security protocols and possesses valuable properties such as unfilterability, inter-operability, hidden key recovery and real time key recovery. He presented key recovery implementation of SSL/TLS and SSH. This paper exploits identity based encryption to implement hidden key recovery and shows how to implement key recovery in IPSec roundly. We conclude that IBE is possible to be used in key recovery as we expected and it is easy to embed key recovery into IPSec. At last, we discuss some issues about practical deployment of IPSec key recovery.
Goh提出了一种基于协议的机制,可以将密钥恢复添加到现有的安全协议中,并具有不可过滤性、互操作性、隐藏密钥恢复和实时密钥恢复等有价值的特性。他介绍了SSL/TLS和SSH的密钥恢复实现。本文利用基于身份的加密实现了隐藏密钥的恢复,并全面展示了如何在IPSec中实现密钥恢复。我们得出结论,IBE可以像我们预期的那样用于密钥恢复,并且很容易将密钥恢复嵌入到IPSec中。最后,讨论了IPSec密钥恢复在实际应用中的一些问题。
{"title":"Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case","authors":"Rui-dan Su, XiangQuan Che, Shaofeng Fu, Longhai Li, Lihua Zhou","doi":"10.1109/NSWCTC.2009.137","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.137","url":null,"abstract":"Goh has proposed a protocol-based mechanism which can add key recovery to existing security protocols and possesses valuable properties such as unfilterability, inter-operability, hidden key recovery and real time key recovery. He presented key recovery implementation of SSL/TLS and SSH. This paper exploits identity based encryption to implement hidden key recovery and shows how to implement key recovery in IPSec roundly. We conclude that IBE is possible to be used in key recovery as we expected and it is easy to embed key recovery into IPSec. At last, we discuss some issues about practical deployment of IPSec key recovery.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Energy-Efficient Dynamic Target Tracking  Protocol for Wireless Sensor Networks 一种新的无线传感器网络节能动态目标跟踪协议
Ming Zhang, Chenglong Gong, Yuan Feng, Yanhong Lu
Wireless sensor networks(WSNs)have received more and more attention  on the object tracking system,but the performance of active routing is low.In this paper,we present an novel energy efficient dynamic target tracking (EE-DTT) protocol for wireless sensor network, EE-DTT has three obvious features: Firstly, it improves virtual grid ideas to divide each cluster  into M×N square area and  select a working node in each grid to reduce redundant information  and  economize energy. Secondly, EE-DTT improves energy utility by changing the activity of wireless communication module of sensor nodes, energy model and state transition of sensor nodes.last,it adopts initiative optimization method to optimize routing.Simulation results show that,compared  with AODV and TSR, EE-DTT significantly  reduce in energy consumption and prolong the network lifetime.
无线传感器网络在目标跟踪系统中受到越来越多的关注,但其主动路由性能较低。本文提出了一种新的无线传感器网络节能动态目标跟踪(EE-DTT)协议,该协议具有三个显著特点:首先,改进了虚拟网格思想,将每个集群划分为M×N方形区域,并在每个网格中选择一个工作节点,减少冗余信息,节约能源;其次,EE-DTT通过改变传感器节点无线通信模块的活动、能量模型和传感器节点的状态转移来提高能源利用率。最后,采用主动优化方法对路径进行优化。仿真结果表明,与AODV和TSR相比,EE-DTT显著降低了网络能耗,延长了网络寿命。
{"title":"A Novel Energy-Efficient Dynamic Target Tracking  Protocol for Wireless Sensor Networks","authors":"Ming Zhang, Chenglong Gong, Yuan Feng, Yanhong Lu","doi":"10.1109/NSWCTC.2009.319","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.319","url":null,"abstract":"Wireless sensor networks(WSNs)have received more and more attention  on the object tracking system,but the performance of active routing is low.In this paper,we present an novel energy efficient dynamic target tracking (EE-DTT) protocol for wireless sensor network, EE-DTT has three obvious features: Firstly, it improves virtual grid ideas to divide each cluster  into M×N square area and  select a working node in each grid to reduce redundant information  and  economize energy. Secondly, EE-DTT improves energy utility by changing the activity of wireless communication module of sensor nodes, energy model and state transition of sensor nodes.last,it adopts initiative optimization method to optimize routing.Simulation results show that,compared  with AODV and TSR, EE-DTT significantly  reduce in energy consumption and prolong the network lifetime.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117055725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Hybrid QR and PIC Detection Scheme Based on MIMO-OFDM Systems 基于MIMO-OFDM系统的QR和PIC混合检测方案
Zhongpeng Wang
Multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) is the key technique for generation communications systems. In this paper an enhanced signal detection scheme is proposed for MIMO-OFDM systems. A combining QR and PIC MIMO detection scheme was directly applied to MIMO-OFDM systems. The performance of algorithm is evaluated based on computer simulation. The simulation results indicate that the performance of the propose wideband receiver outperforms the V-BLAST in MIMO-OFDM systems. At symbol error rate 1e-3, the proposed scheme can obtain the 2dB gain to V-BLAST algorithms based on MIMO-OFDM systems.
多输入多输出正交频分复用(MIMO-OFDM)是生成通信系统的关键技术。本文提出了一种用于MIMO-OFDM系统的增强信号检测方案。将QR和PIC相结合的MIMO检测方案直接应用于MIMO- ofdm系统。在计算机仿真的基础上对算法的性能进行了评价。仿真结果表明,该宽带接收机的性能优于MIMO-OFDM系统中的V-BLAST。在码元误码率为1e-3的情况下,该方案比基于MIMO-OFDM系统的V-BLAST算法获得2dB增益。
{"title":"A Hybrid QR and PIC Detection Scheme Based on MIMO-OFDM Systems","authors":"Zhongpeng Wang","doi":"10.1109/NSWCTC.2009.386","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.386","url":null,"abstract":"Multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) is the key technique for generation communications systems. In this paper an enhanced signal detection scheme is proposed for MIMO-OFDM systems. A combining QR and PIC MIMO detection scheme was directly applied to MIMO-OFDM systems. The performance of algorithm is evaluated based on computer simulation. The simulation results indicate that the performance of the propose wideband receiver outperforms the V-BLAST in MIMO-OFDM systems. At symbol error rate 1e-3, the proposed scheme can obtain the 2dB gain to V-BLAST algorithms based on MIMO-OFDM systems.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129595866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Formal Verification Model for Trustworthiness of Component Interface 构件接口可信性的形式化验证模型
Wang Dan, Zhao Jing
Components are considered as black boxes and are connected with other components through required interfaces and provided interfaces. Therefore, the correct specifications of components are the basis of using and assembling components. The connection between two components is trustworthy only if all their interfaces are correctly compatible. B method is applied to define the specification of component interfaces and verify trustworthiness of component connections in this paper. UML class diagram and state diagram are firstly applied to intuitively describe the syntactic and semantic information of component interface, then the formal specification of component interface defined by B abstract machine is presented. The trustworthiness of component connection is further verified in terms of B refinement mechanism which can prove that the machine of the provided interface is a correct refinement of the machine of the required interface. Since B tools could be used to verify whether a provided interface is a correct refinement of a required interface, the complex manual verifying process could be simplified, and the verifying result is more accurate and reliable.
组件被视为黑盒,通过所需的接口和提供的接口与其他组件连接。因此,正确的元器件规格是使用和装配元器件的基础。只有当两个组件之间的所有接口都正确兼容时,它们之间的连接才是可信的。本文采用B方法定义组件接口规范,验证组件连接的可信性。首先应用UML类图和状态图直观地描述组件接口的语法和语义信息,然后给出B抽象机定义的组件接口的形式化规范。通过B细化机制进一步验证组件连接的可信度,该机制可以证明所提供接口的机器是所需接口的机器的正确细化。由于可以使用B种工具来验证所提供的接口是否是所需接口的正确细化,因此可以简化复杂的人工验证过程,并且验证结果更加准确可靠。
{"title":"A Formal Verification Model for Trustworthiness of Component Interface","authors":"Wang Dan, Zhao Jing","doi":"10.1109/NSWCTC.2009.53","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.53","url":null,"abstract":"Components are considered as black boxes and are connected with other components through required interfaces and provided interfaces. Therefore, the correct specifications of components are the basis of using and assembling components. The connection between two components is trustworthy only if all their interfaces are correctly compatible. B method is applied to define the specification of component interfaces and verify trustworthiness of component connections in this paper. UML class diagram and state diagram are firstly applied to intuitively describe the syntactic and semantic information of component interface, then the formal specification of component interface defined by B abstract machine is presented. The trustworthiness of component connection is further verified in terms of B refinement mechanism which can prove that the machine of the provided interface is a correct refinement of the machine of the required interface. Since B tools could be used to verify whether a provided interface is a correct refinement of a required interface, the complex manual verifying process could be simplified, and the verifying result is more accurate and reliable.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-secret Images Sharing Based on Matrix Multiplication 基于矩阵乘法的多秘密图像共享
Zhengfeng Hou, Hanjun Gao
Based on matrix multiplication secret sharing method, a multi-secret images sharing scheme is presented. In our scheme, participants only need to pool their pseudo-shadow instead of disclosing his secret share when recovering secret images. That is to say, each participant can share many secret images with others by holding only one secret share. Unlike other known image sharing scheme, it doesn’t generating shadow images which are difficult to manage and identify. Integrating the above advantages, this scheme is a practical and effective multi-secret image sharing scheme.
基于矩阵乘法秘密共享方法,提出了一种多秘密图像共享方案。在我们的方案中,参与者在恢复秘密图像时只需要汇集他们的伪影子,而不需要泄露他的秘密份额。也就是说,每个参与者只需持有一个秘密共享,就可以与他人共享多个秘密图像。与其他已知的图像共享方案不同,它不会产生难以管理和识别的阴影图像。该方案综合了上述优点,是一种实用有效的多秘密图像共享方案。
{"title":"Multi-secret Images Sharing Based on Matrix Multiplication","authors":"Zhengfeng Hou, Hanjun Gao","doi":"10.1109/NSWCTC.2009.94","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.94","url":null,"abstract":"Based on matrix multiplication secret sharing method, a multi-secret images sharing scheme is presented. In our scheme, participants only need to pool their pseudo-shadow instead of disclosing his secret share when recovering secret images. That is to say, each participant can share many secret images with others by holding only one secret share. Unlike other known image sharing scheme, it doesn’t generating shadow images which are difficult to manage and identify. Integrating the above advantages, this scheme is a practical and effective multi-secret image sharing scheme.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A State-Adaptive Access Control Model for Web-Based IDRS System 基于web的IDRS系统状态自适应访问控制模型
Xinsong Wu, Yeping He, Zhouyi Zhou
Role based access control reduces the cost of security administration of large-scale systems. However, it mainly abstracts a user from the function aspect, which is not enough for some complex large-scale systems. In web-based IDRS (Infectious Disease Reporting System), access control is based on not only the function attribute, but domain and category attributes of a user. Meanwhile, the domain and category attributes of a user need to adapt to state changes. We present a state-adaptive access control model that uses role, domain and category attributes to enforce access control. Moreover, it supports dynamic adjustment of domain and category attributes of a user based on state transition.
基于角色的访问控制降低了大型系统的安全管理成本。然而,它主要是从功能方面对用户进行抽象,这对于一些复杂的大型系统来说是不够的。在基于web的传染病报告系统(IDRS)中,访问控制不仅基于用户的功能属性,还基于用户的域和类别属性。同时,用户的域和类别属性需要适应状态的变化。提出了一种状态自适应的访问控制模型,该模型使用角色、领域和类别属性来实施访问控制。此外,它还支持基于状态转换动态调整用户的域和类别属性。
{"title":"A State-Adaptive Access Control Model for Web-Based IDRS System","authors":"Xinsong Wu, Yeping He, Zhouyi Zhou","doi":"10.1109/NSWCTC.2009.32","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.32","url":null,"abstract":"Role based access control reduces the cost of security administration of large-scale systems. However, it mainly abstracts a user from the function aspect, which is not enough for some complex large-scale systems. In web-based IDRS (Infectious Disease Reporting System), access control is based on not only the function attribute, but domain and category attributes of a user. Meanwhile, the domain and category attributes of a user need to adapt to state changes. We present a state-adaptive access control model that uses role, domain and category attributes to enforce access control. Moreover, it supports dynamic adjustment of domain and category attributes of a user based on state transition.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Secondary Access in the Spectrum Sharing System with Call Admission Control Strategy 基于呼叫接纳控制策略的频谱共享系统二次接入性能研究
Xueyuan Jiang, Zhiyuan Shi, Wumei Wang, Lianfeng Huang
Recently, secondary usage methods have been proposed to utilize the spectrum holes in the licensed spectrum bands. In our previous works [6], based on the concept of spectrum pooling, an opportunistic spectrum sharing system with heterogeneous secondary users was proposed. In this paper, a spectrum sharing system with call admission control strategy is proposed. By analyzing the forced termination probability and blocked probability of secondary users, the QoS guarantee for secondary access is insightful studied. Numerical results show that the proposed call admission strategy can increase the throughput of secondary users significantly, as well as guarantee the access priority of primary user.
近年来,人们提出了利用许可频段中的频谱孔的二次利用方法。在我们之前的工作[6]中,基于频谱池的概念,提出了一种具有异构二次用户的机会频谱共享系统。本文提出了一种具有呼叫接纳控制策略的频谱共享系统。通过分析二次用户的强制终止概率和阻塞概率,对二次接入的QoS保障问题进行了深入的研究。数值结果表明,该策略在保证主用户接入优先级的前提下,显著提高了从用户的吞吐量。
{"title":"Performance of Secondary Access in the Spectrum Sharing System with Call Admission Control Strategy","authors":"Xueyuan Jiang, Zhiyuan Shi, Wumei Wang, Lianfeng Huang","doi":"10.1109/NSWCTC.2009.206","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.206","url":null,"abstract":"Recently, secondary usage methods have been proposed to utilize the spectrum holes in the licensed spectrum bands. In our previous works [6], based on the concept of spectrum pooling, an opportunistic spectrum sharing system with heterogeneous secondary users was proposed. In this paper, a spectrum sharing system with call admission control strategy is proposed. By analyzing the forced termination probability and blocked probability of secondary users, the QoS guarantee for secondary access is insightful studied. Numerical results show that the proposed call admission strategy can increase the throughput of secondary users significantly, as well as guarantee the access priority of primary user.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130288030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1