
Journal of Shanghai Jiaotong University››2014,Vol. 48››Issue (07): 914-921.
• Automation Technique, Computer Technology •Previous ArticlesNext Articles
Received:2013-09-16Online:2014-07-28Published:2014-07-28CLC Number:
DENG Rui,CHEN Zuoning. Group-Centric Secure Information Sharing Hybrid Model Based on Trusted Computing
[J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 914-921.
|
[1]沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学E辑:信息科学, 2007,37(2):129150.
SHEN Cangxiang, ZHANG Huanguo, FENG Dengguo, et al. Survey on information security[J]. Science in China Series E:Information Sciences, 2007, 37(2):129155.
[2]Sandhu R, Ranganathan K, Zhang X. Secure information sharing enabled by trusted computing and PEI models[C]∥ Proc of ACM Symp on Inf Computer and Comm Security. New York:ACM, 2006:212.
[3]Krishnan R, Sandhu R, Ranganathan K. PEImodels towards scalable, usable and highassurance information sharing[C]∥ Proc of 12th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2007: 145150.
[4]Krishnan R, Sandhu R, Niu J, et al. A conceptual framework for groupcentric secure information sharing[C]∥ Proc of 4th ACM Symposium on Information, Computer and Comm Security. New York: ACM, 2009:384387.
[5]Sandhu R, Krishnan R, Niu J, et al.Groupcentric models for secure and agile information sharing[C]∥ MMMACNS’10, LNCS 6258. Berlin: SpringerVerlag, 2010: 5569.
[6]Krishnan R, Sandhu R, Niu J, et al. Towards a framework for groupcentric secure collaboration[C]∥ Collaborate Com’09. Washington: IEEE, 2009: 110.
[7]Krishnan R, Sandhu R. Enforcement architecture and implementation model for groupcentric information sharing[C]∥ Proc of 1st International Workshop on Security and Comm Networks. Trondheim: IEEE, 2009: 18.
[8]Krishnan R, Sandhu R. A hybrid enforcement model for groupcentric secure information sharing[C]∥ Proc of CSE. Vancouver:IEEE, 2009: 189194.
[9]Mori R, Kawahara M. Super distribution: The concept and the architecture[J]. The Transactions of the IEICE, 1990,73(7):11331146.
[10]邓锐,陈左宁. 基于策略嵌入和可信计算的完整性主动动态度量架构[J]. 计算机应用研究,2013,30(1):261264.
DENG Rui, CHEN Zuoning. Policy embedded dynamic integrity active measurement architecture[J]. Application Research of Computers, 2013,30(1):261264.
[11]Boyd C. Digital multisignatures[C]∥ Cryptography and Coding. Oxford: Oxford University Press, 1986: 241246.
[12]Sandhu R, Bellare M, Ganesan R. Passwordenabled PKI: Virtual smartcards versus virtual soft tokens[C]∥ Proc of 1st Annual PKI Research Workshop. United States:NIST, 2002: 8996.
|
| [1] | YANG Zhen,FU Zhuang,GUAN Enguang,XU Jiannan,TIAN Shihe,ZHENG Hui.The Kinematic Analysis and Structure Optimization of MLattice Modular Robot[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1153-1159. |
| [2] | ZHAO Jun1,YU Haidong2.Dynamic Analysis of TwoLink Flexible Manipulators Based on the Absolute Nodal Coordinate Formulation[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1160-1165. |
| [3] | ZHAO Ziren1,DU Shichang1,HUANG Delin1,REN Fei2,LIANG Xinguang2.Modelling and Bottleneck Analysis of Product Quality in Transient Phase of MultiStage Manufacturing Systems Based on Markovian Chains[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1166-1173. |
| [4] | HUANG Xuangui.Algorithm for Relatively Small Planted Clique with Small Edge Probability[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1202-1206. |
| [5] | LUO Jingjinga,YU Haidonga,ZHAO Chunzhanga,b,WANG Haoa,b.Study on Motion Stability of Variable CrossSection Flexible Beams Based on the Absolute Nodal Coordinate Formulation[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1174-1180. |
| [6] | WANG Yibo1,HUANG Yixiang1,LI Bingchu1,LING Xiao1 ZHAO Shuai1,LIU Chengliang1,ZHANG Daqing2.An Improved Modal Simulation Method for Switched Reluctance Motor Based on Static PreComputation[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1181-1188. |
| [7] | ZHOU Binghai,LI Ming.Scheduling Method of Manufacturing Cells with Robot Restricted Processing[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1214-1219. |
| [8] | CHEN Jinping1,ZHANG Shusheng1,HE Weiping1,WANG Mingwei1,HUANG Hui2.Feasible Change Path Search and Optimization Method Based on Driving Parameter Modeling[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1220-1227. |
| [9] | ZHOU Penghui,MA Hongzhan,CHEN Dongping,CHEN Mengyue,CHU Xuening.Identification of Product Redesign Modules Based on Fuzzy Random Failure Mode and Effects Analysis[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1189-1195. |
| [10] | PENG Cheng,ZHU Jianyun,CHEN Li.Mode Transition for a Hybrid Electric Vehicle Based on Model Reference Control[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1196-1201. |
| [11] | LIU Wei,YANG Chao .A Study on Injection Mould Part Quotation Model Based on Back Propagation Neural Network[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1207-1213. |
| [12] | CHEN Suting,WANG Zhuo,WANG Qi.Aerial Scene Classification Based on Nonlinear Scale Space[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1228-1234. |
| [13] | CHEN Ning,HE Xiaobin,GUI Weihua,YANG Chunhua.Research on Image Encryption System Based on Chaotic Discrete Sequence[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1273-1280. |
| [14] | LIU Kaia,ZHANG Liminb,ZHOU Lijuna.Design of Random Restricted Boltzmann Machine Group[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1235-1240. |
| [15] | ZHU Xinyao1,SONG Baowei2,XU Gang1,YANG Songlin1.Research on Landing Strategy and Influencing Factors of an Autonomous Underwater Vehicle with Supporting Mechanism[J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1241-1251. |
| Viewed | ||||||
| Full text |
|
|||||
| Abstract |
|
|||||