期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Research on Multicloud Access Control Policy Integration Framework
1
作者 Peng Zhao Lifa Wu +1 位作者 Zheng Hong He Sun 《China Communications》 SCIE CSCD 2019年第9期222-234,共13页
Multicloud access control is important for resource sharing and security interoperability across different clouds,and heterogeneity of access control policy is an important challenge for cloud mashups.XACML is widely ... Multicloud access control is important for resource sharing and security interoperability across different clouds,and heterogeneity of access control policy is an important challenge for cloud mashups.XACML is widely used in distributed environment as a declaratively fine-grained,attribute-based access control policy language,but the policy integration of XACML lacks formal description and theory foundation.Multicloud Access Control Policy Integration Framework(MACPIF)is proposed in the paper,which consists of Attribute-based Policy Evaluation Model(ABPEM),Four-value Logic with Completeness(FLC)and Four-value Logic based Policy Integration Operators(FLPIOs).ABPEM evaluates access control policy and extends XACML decision to four-value.According to policy decision set and policy integration characteristics,we construct FLC and define FLPIOs including Intersection,Union,Difference,Implication and Equivalence.We prove that MACPIF can achieve policy monotonicity,functional completeness,canonical suitability and canonical completeness.Analysis results show that this framework can meet the requirements of policy integration in Multicloud. 展开更多
关键词 Multicloud ACCESS CONTROL policyintegration four-value LOGIC
在线阅读 下载PDF
Inverted XML Access Control Model Based on Ontology Semantic Dependency
2
作者 Meijuan Wang Jian Wang +1 位作者 Lihong Guo Lein Harn 《Computers, Materials & Continua》 SCIE EI 2018年第6期465-482,共18页
In the era of big data,the conflict between data mining and data privacy protection is increasing day by day.Traditional information security focuses on protecting the security of attribute values without semantic ass... In the era of big data,the conflict between data mining and data privacy protection is increasing day by day.Traditional information security focuses on protecting the security of attribute values without semantic association.The data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive information.Considering the semantic association,reasonable security access for privacy protect is required.Semi-structured and self-descriptive XML(eXtensible Markup Language)has become a common form of data organization for database management in big data environments.Based on the semantic integration nature of XML data,this paper proposes a data access control model for individual users.Through the semantic dependency between data and the integration process from bottom to top,the global visual range of inverted XML structure is realized.Experimental results show that the model effectively protects the privacy and has high access efficiency. 展开更多
关键词 Privacy protection access control semantic dependence inverted XML global view
在线阅读 下载PDF
Satellite Navigation Method Based on High-Speed Frequency Hopping Signal 被引量:1
3
作者 En Yuan Peng Liu +4 位作者 Weiwei Chen Rui Wang Bing Xu Wenyu Zhang Yanqin Tang 《China Communications》 SCIE CSCD 2023年第7期321-337,共17页
Global navigation satellite system has been widely used,but it is vulnerable to jamming.In military satellite communications,frequency hopping(FH)signal is usually used for anti-jamming communications.If the FH signal... Global navigation satellite system has been widely used,but it is vulnerable to jamming.In military satellite communications,frequency hopping(FH)signal is usually used for anti-jamming communications.If the FH signal can be used in satellite navigation,the anti-jamming ability of satellite navigation can be improved.Although a recently proposed timefrequency matrix ranging method(TFMR)can use FH signals to realize pseudorange measurement,it cannot transmit navigation messages using the ranging signal which is crucial for satellite navigation.In this article,we propose dual-tone binary frequency shift keyingbased TFMR(DBFSK-TFMR).DBFSK-TFMR designs an extended time-frequency matrix(ETFM)and its generation algorithm,which can use the frequency differences in different dual-tone signals in ETFM to modulate data and eliminate the negative impact of data modulation on pseudorange measurement.Using ETFM,DBFSK-TFMR not only realizes the navigation message transmission but also ensures the precision and unambiguous measurement range of pseudorange measurement.DBFSK-TFMR can be used as an integrated solution for anti-jamming communication and navigation based on FH signals.Simulation results show that DBFSK-TFMR has almost the same ranging performance as TFMR. 展开更多
关键词 satellite navigation frequency hopping RANGING navigation message transmission
在线阅读 下载PDF
Mutation Testing for Integer Overflow in Ethereum Smart Contracts 被引量:6
4
作者 Jinlei Sun Song Huang +3 位作者 Changyou Zheng Tingyong Wang Cheng Zong Zhanwei Hui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第1期27-40,共14页
Integer overflow is a common vulnerability in Ethereum Smart Contracts(ESCs)and often causes huge economic losses.Smart contracts cannot be changed once it is deployed on the blockchain and thus demand further testing... Integer overflow is a common vulnerability in Ethereum Smart Contracts(ESCs)and often causes huge economic losses.Smart contracts cannot be changed once it is deployed on the blockchain and thus demand further testing.Mutation testing is a fault-based testing method that can effectively improve the sufficiency of a test for smart contracts.However,existing methods cannot efficiently perform mutation testing specifically for integer overflow in ESCs.Therefore,by analyzing integer overflow in ESCs,we propose five special mutation operators to address such vulnerability in terms of detecting sufficiency in ESC testing.An empirical study on 40 open-source ESCs is conducted to evaluate the effectiveness of the proposed mutation operators.Results show that(1)our proposed mutation operators can reproduce all 179 integer overflow vulnerabilities in 40 smart contracts,and the generated mutants have high compilation pass rate and integer overflow vulnerability generation rate;moreover,(2)the generated mutants can find the shortcomings of existing testing methods for integer overflow vulnerability,thereby providing effective support to improve the sufficiency of the test. 展开更多
关键词 blockchain Ethereum Smart Contracts(ESCs) integer overflow mutation testing
原文传递
A Novel Cross-Project Software Defect Prediction Algorithm Based on Transfer Learning 被引量:5
5
作者 Shiqi Tang Song Huang +3 位作者 Changyou Zheng Erhu Liu Cheng Zong Yixian Ding 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2022年第1期41-57,共17页
Software Defect Prediction(SDP) technology is an effective tool for improving software system quality that has attracted much attention in recent years.However,the prediction of cross-project data remains a challenge ... Software Defect Prediction(SDP) technology is an effective tool for improving software system quality that has attracted much attention in recent years.However,the prediction of cross-project data remains a challenge for the traditional SDP method due to the different distributions of the training and testing datasets.Another major difficulty is the class imbalance issue that must be addressed in Cross-Project Defect Prediction(CPDP).In this work,we propose a transfer-leaning algorithm(TSboostDF) that considers both knowledge transfer and class imbalance for CPDP.The experimental results demonstrate that the performance achieved by TSboostDF is better than those of existing CPDP methods. 展开更多
关键词 Software Defect Prediction(SDP) transfer learning imbalance class cross-project
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部