http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Dynamic Trust Model Based on Extended Subjective Logic
( Tian Junfeng ),( Zhang Jiayao ),( Zhang Peipei ),( Andma Xiaoxue ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.8
In Jøsang’s trust model, trust evaluation is obtained through operators, but there are problems with the mutuality and asymmetry of trust and the impact of event weight on trust evaluation. Trust evaluation is updated dynamically and continuously with time and the process of interactions, but it has not been reflected in Jøsang’s model. Therefore, final trust evaluation is not accurate, and malicious fraud cannot be prevented effectively. This causes the success rate of interaction to be low. To solve these problems, a new dynamic trust model is proposed based on extended subjective logic (DTM-ESL). In DTM-ESL, the event weight and the mutuality of trust are fully considered, the original one-way trust relationship is extended to a two-way trust relationship, discounting and consensus operators are improved, and trust renewal is designed based on event weight. The viability and effectiveness of this new model are verified by simulation experiments.
Multi-layered Process Isolation Management in Virtual Environment
Tian Junfeng,Zheng Junfang,Cai Hongyun 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.6
For the problem that the process running is not security in the virtual environment, a multi-level process isolation management scheme is proposed. In this scheme, the processes and the basic runtime environment is defined as the process space. It takes a level hierarchical division strategy to classify the processes from the process space into two levels. One of which is the level of credible processes and another is the level data confidential processes. Under the strategy, the processes operate with different permission to ensure the security of sensitive information, prevent data leaking, operate legally and operate under authority. Finally simulation experiment results show that the method has a good protection to the process running in a virtual environment and it can meet the needs of data confidentiality. At the same time, the overhead of running processes is not obvious.
Pheromone-Based Genetic Algorithm Adaptive Selection Algorithm in Cloud Storage
TIAN Junfeng,LI Weiping 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.6
Aiming at the problem of replica selection optimization in cloud storage load balancing technology, a new dynamic selection algorithm based on genetic algorithm(GASA in short ) is proposed. According to the principle of genetic algorithm, the model of dynamic selection strategy based on genetic algorithm is constructed, and then the key steps of the replica selection criteria and genetic algorithm are mapped, and then the optimal solution is obtained by using the probability equation. Lastly. simulation results from cloud test bed. which is based on Optorsim. show that GASA can reduce data access latency and bandwidth consumption. and effectively achieve cloud load balancing between storage nodes and improve the speed of data access.
Design and Research of Hybrid Network Electronic Forensics Model Based on Cloud Computing
Tian Junfeng,Li Weiping 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.12
With the increase of computer network crimes and the changes of the forms, the work of the network electronic forensics is becoming more and more important, and it is required that the technology of electronic forensics should be adapted to the development of complex network crimes. In this paper, the traditional electronic evidence collection technology and the electronic evidence collection method in recent years are studied, and then the hybrid network electronic evidence collection model based on cloud computing environment is proposed, which can work for electronic forensics in dynamic, fast and real-time ways so as to fight against network crimes more effectively.
The Software Trustworthiness Evaluation Model Based on Subjective Logic
Jiao Hongqiang,Tian Junfeng 보안공학연구지원센터 2015 International Journal of Hybrid Information Techno Vol.8 No.1
In recent years, the trustworthiness of the software has become the focus of software quality. The software trustworthiness analysis and measurement has become a hot issue. Because of the great influence of software environment dynamic openness and uncertainty to the trustworthiness of the software, this paper attempts to examine the changes of software running environment, consider the impact on the software trustworthiness, and build the software trustworthiness evaluation (STE) model with subjective logic. The model can be real-time control the software running state and evaluate the software trustworthiness dynamically. In addition, on the setting of weight aspect, a subjective group preference weight setting algorithm is designed. Simulation results show that the model is reasonable and effective can be more accurate to evaluate the software trustworthiness.
Distinct Electronic Structure for the Extreme Magnetoresistance in YSb
He, Junfeng,Zhang, Chaofan,Ghimire, Nirmal J.,Liang, Tian,Jia, Chunjing,Jiang, Juan,Tang, Shujie,Chen, Sudi,He, Yu,Mo, S.-K.,Hwang, C. C.,Hashimoto, M.,Lu, D. H.,Moritz, B.,Devereaux, T. P.,Chen, Y. L American Physical Society 2016 Physical Review Letters Vol.117 No.26
Personalized Trusted Service Recommendation Method based on Social Work
Du Ruizhong,Pei Zhi,Tian Junfeng 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.9
In order to improve credibility and precision of the personalized service recommendation, we propose a personalized trusted services recommendation method based on social network. Firstly, according to the similarity of user's preference, the method build new relations combined with direct trust and indirect trust of users between them. Secondly, form a set of similar services which includes services invoked by target users. Eventually, get user’s indirect trustrank to the recommended services through the weighted average of the target users’ indirect trustrank to the recommended service and thus form a recommendation list. The experiment take precision rate, recall rate and F1_Measure as evaluation indexes. Comparing with traditional method which based on no confidence and users’ trusted network, this approach demonstrates its effectiveness and feasibility through the result of the experiment.