http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Analysis of Typical Secure Routing Protocols in WSN
Jingsha He,Bo Zhou,Ruohong Liu 보안공학연구지원센터 2014 International Journal of Security and Its Applicat Vol.8 No.6
This paper will first sum up the typical attacks and countermeasures in the network layer of Wireless Sensor Network (WSN), then it will classify the existing secure routing protocols according to the core secure schemes used by them, and emphatically introduce and analyze the typical ones among them. Finally this paper will propose some problems on secure routing, which requires further studying.
Trust Based Service Optimization Selection for Cloud Computing
Xiaohui Li,Jingsha He,Ying Du 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.5
We present an approach for privacy preservation in cloud computing environment in which we propose to use information entropy and rough set theory with the goal of personalized privacy protection in cloud users during service selection based on trust. In the approach, cloud server is as an active service provider to personalize the cloud user privacy, cloud user selects the service which is quantified by trust for multi-tenant personalized privacy protection needs. We descript user privacy information by the service and trust attributes, design a multi-attribute service quantization algorithm using information entropy and rough set theory for the quality of service. The approach can achieve the purpose of quantitative service and dynamically adjust the supply relationship service based on multi-attribute, analysis shows which can effectively protect user privacy and personalization by quantifying the cloud service.