Applied Mechanics and Materials
Vol. 528
Vol. 528
Applied Mechanics and Materials
Vol. 527
Vol. 527
Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials
Vol. 521
Vol. 521
Applied Mechanics and Materials
Vols. 519-520
Vols. 519-520
Applied Mechanics and Materials
Vol. 518
Vol. 518
Applied Mechanics and Materials
Vols. 513-517
Vols. 513-517
Applied Mechanics and Materials
Vols. 511-512
Vols. 511-512
Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials Vols. 519-520
Paper Title Page
Abstract: Based on previous research, this paper puts forward a kind of routing protocol based on node convergence degree and the trust value which named BCDTV. We focus on algorithm design and work process, including the election of cluster head and the establishment of cluster, the collection and transmission of the information. We use the gradational design algorithm when calculation the trust of every nodes. Simulation results show that the protocol can prevent some malicious behavior of malicious nodes effectively.
155
Abstract: This paper proposes a protection mechanism called trust system. The purpose of this article is to enhance supervisory control and data-acquisition (SCADA) security with minimal impact on our existing power communication systems. This paper concentrates on placing trust system into our existing power system and creates new security system implementations to increase its flexibility. What’s more, the SCADA security issues between electric utilities are also discussed.
160
Abstract: Based on the analysis and research of micro-blogging network transmission of information, the transmission of information model is constructed. By studying the network model, a small group of core users of the network information dissemination play a guiding role. To solve the problem that the research of micro-blogging user influence ranking can only ranking order given its influence, but not determine which user play a guiding role in transmission of information, LeadersRank algorithm based on the idea of personalized PageRank algorithm is proposed, and the algorithm is applied to the real micro-blogging data to identify the leading group, the experimental results prove the feasibility and effectiveness of the algorithm.
164
Abstract: Mobile devices are emerging with multiple interfaces with diverse access technologies. Using multiple interfaces simultaneously can bring lots of benefits to users. Multi-Path TCP is proposed in recent years, which aims to provide the capability for a TCP host to simultaneously use its multiple interfaces to transmit in one TCP connection. However the original MPTCP data scheduling algorithm has some defects and cannot fit multiple kinds of applications to achieve maximize throughput. We thus proposed and implemented an optimized MPTCP data scheduling algorithm. We used the type of service of an application and quality parameters of each interfaces measured in real time to calculate the best path dynamically. The results of the experiment showed that our algorithm had better performance than the original one in achieving higher data throughput, resource utilization and more rationality during an MPTCP transmission.
170
Abstract: PMP-AODV routing protocol which introduces priority setting, multi-point relay and path stability is proposed. The algorithm message format is discussed, the MPR selection algorithm is elaborated, the measurement of stability of path is designed, and the working flow of PMP-AODV is analyzed. The simulation result shows that the PMP-AODV protocol is less packet loss rate and lower end-to-end delay than original AODV protocol under the large wireless Mesh network.
177
Abstract: Role mapping is a basic technique for facilitating interoperation in RBAC-based collaborating environments. However, role mapping lacks the flexibility to specify access control policies in the scenarios where the access control is not a simple action, but consists of a sequence of actions and events from subjects and system. In this paper, we propose an attribute mapping technique to establish secure context in multi-domain environments. We first classify attributes into eight types and show that only two types of attributes need to be translated. We second give the definition of attribute mapping technique, and analysis the properties of attribute mapping. Finally, we study how cardinality constraint violation arises and shows that it is efficient to resolve this security violation.
181
Abstract: Based on the rainbow signature scheme and combining the minus perturbation method of the Shamir, a new light-weight rainbow signature scheme is proposed. This scheme only uses the addition and multiplication operation, so it can be performed easily. This scheme has high security and can resist the minimal rank, rank reduction attacks and oil-vinegar attacks, etc. Based new signature scheme, we also design authentication mechanism for the WSN. According to the characters of the cluster WSN, this authentication mechanism can choose proper authentication parameters to realize the authentication on the cluster WSN by the platform and the authentication between the sensor node and its neighbor nodes.
185
Abstract: Honeypot is a new type of active defense security technologies. This paper attempts to use of data mining methods to be mining and analysis of information collected on the honeypot system. Build a Windows system based on virtual machine technology research honeynet. Data collection be standardized and sequential pattern mining. Finding out the correlation between different data records and frequent with time-based sequence of audit data, which found that,select the law of value of the attack.
189
Abstract: As a new cloud computing services and computing model itself does not break away from traditional concepts of information security coverage, still faces a variety of traditional security threats, including physical physical security, network security, host security. Because of their characteristics of cloud computing will lead to generate some new security issues, such as internal virtual machine to attack each other, the super administrator rights and other issues. In this paper, cloud computing security problems faced by specific solutions.
193
Abstract: Resource index constructing method directly influences resource retrieval efficiency in structured P2P network, a new approach to semantic-preserved index constructing for RDF-based resource is proposed. Firstly, each class in resource concept structure is assigned a class ID, RDF-based resource index is constructed by two-dimensional value consisted of class ID; secondly, the mapping from two-dimensional index to one-dimensional routing space of structured P2P network is achieved by Hilbert space filling curve; at last, resource query is realized by embedding the process of searching into the nodes of structured P2P networks and using the data search mechanism of networks. Algorithm analysis shows that this approach supports multidimensional semantic retrieval, resolves the problems that only support exact query based on single key words and the irrelevance between logical location and physical location because of ignoring semantic information, and improves RDF-based resource semantic retrieval efficiency in structured P2P network.
197