Quorum systems have been used to solve the problem of data consistency in distributed fault-tolerance systems. But when intrusions occur, traditional quorum systems have some disadvantages. For example, synchronous qu...Quorum systems have been used to solve the problem of data consistency in distributed fault-tolerance systems. But when intrusions occur, traditional quorum systems have some disadvantages. For example, synchronous quorum systems are subject to DOS attacks, while asynchronous quorum systems need a larger system size (at least 3f+1 for generic data, and f fewer for self-verifying data). In order to solve the problems above, an intrusion-tolerance quorum system (ITQS) of hybrid time model based on trust timely computing base is presented (TTCB). The TTCB is a trust secure real-time component inside the server with a well defined interface and separated from the operation system. It is in the synchronous communication environment while the application layer in the server deals with read-write requests and executes update-copy protocols asynchronously. The architectural hybridization of synchrony and asynchrony can achieve the data consistency and availability correctly. We also build two kinds of ITQSes based on TTCB, i.e., the symmetrical and the asymmetrical TTCB quorum systems. In the performance evaluations, we show that TTCB quorum systems are of smaller size, lower load and higher availability.展开更多
The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the inform...The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the information flow is studied. Firstly, existing methods cannot analyze the impact of the system states on the trustworthiness of software during the process of trust chain trans- fer. To solve this problem, the impact of the system state on trust- worthiness of software is investigated, the run-time mutual interfer- ence behavior of software entitles is described and an interference model of the access control automaton of a system is established. Secondly, based on the intransitive noninterference (INI) theory, a formal analytic method of trustworthiness for trust chain transfer is proposed, providing a theoretical basis for the analysis of dynamic trustworthiness of software during the trust chain transfer process. Thirdly, a prototype system with dynamic trustworthiness on a plat- form with dual core architecture is constructed and a verification algorithm of the system trustworthiness is provided. Finally, the monitor hypothesis is extended to the dynamic monitor hypothe- sis, a theorem of static judgment rule of system trustworthiness is provided, which is useful to prove dynamic trustworthiness of a system at the beginning of system construction. Compared with previous work in this field, this research proposes not only a formal analytic method for the determination of system trustworthiness, but also a modeling method and an analysis algorithm that are feasible for practical implementation.展开更多
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre...With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.展开更多
In order to solve the problem of uncertainty and fuzzy information in the process of weapon equipment system selec-tion,a multi-attribute decision-making(MADM)method based on probabilistic hesitant fuzzy set(PHFS)is p...In order to solve the problem of uncertainty and fuzzy information in the process of weapon equipment system selec-tion,a multi-attribute decision-making(MADM)method based on probabilistic hesitant fuzzy set(PHFS)is proposed.Firstly,we introduce the concept of probability and fuzzy entropy to mea-sure the ambiguity,hesitation and uncertainty of probabilistic hesitant fuzzy elements(PHFEs).Sequentially,the expert trust network is constructed,and the importance of each expert in the network can be obtained by calculating the cumulative trust value under multiple trust propagation paths,so as to obtain the expert weight vector.Finally,we put forward an MADM method combining the probabilistic hesitant fuzzy entropy and grey rela-tion analysis(GRA)model,and an illustrative case is employed to prove the feasibility and effectiveness of the method when solving the weapon system selection decision-making problem.展开更多
国际脊髓学会在Spinal Cord第45卷第1期发表了International spinal research trust research strategy(Ⅲ):a discussion document。其内容反映了当今国际脊髓损伤研究动向,对我国脊髓损伤临床治疗与基础研究有指导意义。特摘要译出供...国际脊髓学会在Spinal Cord第45卷第1期发表了International spinal research trust research strategy(Ⅲ):a discussion document。其内容反映了当今国际脊髓损伤研究动向,对我国脊髓损伤临床治疗与基础研究有指导意义。特摘要译出供读者参考。展开更多
Web2.0的飞速发展使各个Internet用户和浩瀚的Web数据源之间建立个性化服务成为可能,但现有的Web网络普遍存在的是用户和数据源之间单一的多对多映射服务,Web数据源之间、Web数据用户之间的相互可用的交叉潜在服务信息没有得到充分利用...Web2.0的飞速发展使各个Internet用户和浩瀚的Web数据源之间建立个性化服务成为可能,但现有的Web网络普遍存在的是用户和数据源之间单一的多对多映射服务,Web数据源之间、Web数据用户之间的相互可用的交叉潜在服务信息没有得到充分利用.如何直观有效地使用户判别网络资源可信度和保证全网数据安全性,是下一代网络提高用户满意度的重要途径.使用演化博弈理论和语义网工程FOAF(friend of a friend)为基础,通过研究Web数据融合和预测Web用户潜在关系,提出NSTD(network source trust distinguish)算法管理网络资源来实现下一代网络资源可信度的有效判别.通过用户行为和用户体验两个维度评估个人互联网应用水平,选择4个用户可信互动参与指数.综合不同地区的网络资源可信应用指数案例验证了提出算法的有效性.展开更多
In this work,synchronous cutting of concave and convex surfaces was achieved using the duplex helical method for the hypoid gear,and the problem of tooth surface error correction was studied.First,the mathematical mod...In this work,synchronous cutting of concave and convex surfaces was achieved using the duplex helical method for the hypoid gear,and the problem of tooth surface error correction was studied.First,the mathematical model of the hypoid gears machined by the duplex helical method was established.Second,the coordinates of discrete points on the tooth surface were obtained by measurement center,and the normal errors of the discrete points were calculated.Third,a tooth surface error correction model is established,and the tooth surface error was corrected using the Levenberg-Marquard algorithm with trust region strategy and least square method.Finally,grinding experiments were carried out on the machining parameters obtained by Levenberg-Marquard algorithm with trust region strategy,which had a better effect on tooth surface error correction than the least square method.After the tooth surface error is corrected,the maximum absolute error is reduced from 30.9μm before correction to 6.8μm,the root mean square of the concave error is reduced from 15.1 to 2.1μm,the root mean square of the convex error is reduced from 10.8 to 1.8μm,and the sum of squared errors of the concave and convex surfaces was reduced from 15471 to 358μm^(2).It is verified that the Levenberg-Marquard algorithm with trust region strategy has a good accuracy for the tooth surface error correction of hypoid gear machined by duplex helical method.展开更多
基金supported by the National Natural Science Foundation of China (60774091)
文摘Quorum systems have been used to solve the problem of data consistency in distributed fault-tolerance systems. But when intrusions occur, traditional quorum systems have some disadvantages. For example, synchronous quorum systems are subject to DOS attacks, while asynchronous quorum systems need a larger system size (at least 3f+1 for generic data, and f fewer for self-verifying data). In order to solve the problems above, an intrusion-tolerance quorum system (ITQS) of hybrid time model based on trust timely computing base is presented (TTCB). The TTCB is a trust secure real-time component inside the server with a well defined interface and separated from the operation system. It is in the synchronous communication environment while the application layer in the server deals with read-write requests and executes update-copy protocols asynchronously. The architectural hybridization of synchrony and asynchrony can achieve the data consistency and availability correctly. We also build two kinds of ITQSes based on TTCB, i.e., the symmetrical and the asymmetrical TTCB quorum systems. In the performance evaluations, we show that TTCB quorum systems are of smaller size, lower load and higher availability.
基金supported by the Natural Science Foundation of Jiangsu Province(BK2012237)
文摘The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the information flow is studied. Firstly, existing methods cannot analyze the impact of the system states on the trustworthiness of software during the process of trust chain trans- fer. To solve this problem, the impact of the system state on trust- worthiness of software is investigated, the run-time mutual interfer- ence behavior of software entitles is described and an interference model of the access control automaton of a system is established. Secondly, based on the intransitive noninterference (INI) theory, a formal analytic method of trustworthiness for trust chain transfer is proposed, providing a theoretical basis for the analysis of dynamic trustworthiness of software during the trust chain transfer process. Thirdly, a prototype system with dynamic trustworthiness on a plat- form with dual core architecture is constructed and a verification algorithm of the system trustworthiness is provided. Finally, the monitor hypothesis is extended to the dynamic monitor hypothe- sis, a theorem of static judgment rule of system trustworthiness is provided, which is useful to prove dynamic trustworthiness of a system at the beginning of system construction. Compared with previous work in this field, this research proposes not only a formal analytic method for the determination of system trustworthiness, but also a modeling method and an analysis algorithm that are feasible for practical implementation.
文摘With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.
基金supported by the National Natural Science Foundation of China(71901214).
文摘In order to solve the problem of uncertainty and fuzzy information in the process of weapon equipment system selec-tion,a multi-attribute decision-making(MADM)method based on probabilistic hesitant fuzzy set(PHFS)is proposed.Firstly,we introduce the concept of probability and fuzzy entropy to mea-sure the ambiguity,hesitation and uncertainty of probabilistic hesitant fuzzy elements(PHFEs).Sequentially,the expert trust network is constructed,and the importance of each expert in the network can be obtained by calculating the cumulative trust value under multiple trust propagation paths,so as to obtain the expert weight vector.Finally,we put forward an MADM method combining the probabilistic hesitant fuzzy entropy and grey rela-tion analysis(GRA)model,and an illustrative case is employed to prove the feasibility and effectiveness of the method when solving the weapon system selection decision-making problem.
文摘国际脊髓学会在Spinal Cord第45卷第1期发表了International spinal research trust research strategy(Ⅲ):a discussion document。其内容反映了当今国际脊髓损伤研究动向,对我国脊髓损伤临床治疗与基础研究有指导意义。特摘要译出供读者参考。
文摘Web2.0的飞速发展使各个Internet用户和浩瀚的Web数据源之间建立个性化服务成为可能,但现有的Web网络普遍存在的是用户和数据源之间单一的多对多映射服务,Web数据源之间、Web数据用户之间的相互可用的交叉潜在服务信息没有得到充分利用.如何直观有效地使用户判别网络资源可信度和保证全网数据安全性,是下一代网络提高用户满意度的重要途径.使用演化博弈理论和语义网工程FOAF(friend of a friend)为基础,通过研究Web数据融合和预测Web用户潜在关系,提出NSTD(network source trust distinguish)算法管理网络资源来实现下一代网络资源可信度的有效判别.通过用户行为和用户体验两个维度评估个人互联网应用水平,选择4个用户可信互动参与指数.综合不同地区的网络资源可信应用指数案例验证了提出算法的有效性.
基金Projects(52075552,51575533,51805555,11662004)supported by the National Natural Science Foundation of China。
文摘In this work,synchronous cutting of concave and convex surfaces was achieved using the duplex helical method for the hypoid gear,and the problem of tooth surface error correction was studied.First,the mathematical model of the hypoid gears machined by the duplex helical method was established.Second,the coordinates of discrete points on the tooth surface were obtained by measurement center,and the normal errors of the discrete points were calculated.Third,a tooth surface error correction model is established,and the tooth surface error was corrected using the Levenberg-Marquard algorithm with trust region strategy and least square method.Finally,grinding experiments were carried out on the machining parameters obtained by Levenberg-Marquard algorithm with trust region strategy,which had a better effect on tooth surface error correction than the least square method.After the tooth surface error is corrected,the maximum absolute error is reduced from 30.9μm before correction to 6.8μm,the root mean square of the concave error is reduced from 15.1 to 2.1μm,the root mean square of the convex error is reduced from 10.8 to 1.8μm,and the sum of squared errors of the concave and convex surfaces was reduced from 15471 to 358μm^(2).It is verified that the Levenberg-Marquard algorithm with trust region strategy has a good accuracy for the tooth surface error correction of hypoid gear machined by duplex helical method.