Journal of Shanghai Jiaotong University ›› 2014, Vol. 48 ›› Issue (07): 914-921.
• Automation Technique, Computer Technology • Previous Articles Next Articles
Received:
2013-09-16
Online:
2014-07-28
Published:
2014-07-28
CLC Number:
DENG Rui,CHEN Zuoning. Group-Centric Secure Information Sharing Hybrid Model Based on Trusted Computing
[1]沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学E辑:信息科学, 2007,37(2):129150. SHEN Cangxiang, ZHANG Huanguo, FENG Dengguo, et al. Survey on information security[J]. Science in China Series E:Information Sciences, 2007, 37(2):129155. [2]Sandhu R, Ranganathan K, Zhang X. Secure information sharing enabled by trusted computing and PEI models[C]∥ Proc of ACM Symp on Inf Computer and Comm Security. New York:ACM, 2006:212. [3]Krishnan R, Sandhu R, Ranganathan K. PEImodels towards scalable, usable and highassurance information sharing[C]∥ Proc of 12th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2007: 145150. [4]Krishnan R, Sandhu R, Niu J, et al. A conceptual framework for groupcentric secure information sharing[C]∥ Proc of 4th ACM Symposium on Information, Computer and Comm Security. New York: ACM, 2009:384387. [5]Sandhu R, Krishnan R, Niu J, et al.Groupcentric models for secure and agile information sharing[C]∥ MMMACNS’10, LNCS 6258. Berlin: SpringerVerlag, 2010: 5569. [6]Krishnan R, Sandhu R, Niu J, et al. Towards a framework for groupcentric secure collaboration[C]∥ Collaborate Com’09. Washington: IEEE, 2009: 110. [7]Krishnan R, Sandhu R. Enforcement architecture and implementation model for groupcentric information sharing[C]∥ Proc of 1st International Workshop on Security and Comm Networks. Trondheim: IEEE, 2009: 18. [8]Krishnan R, Sandhu R. A hybrid enforcement model for groupcentric secure information sharing[C]∥ Proc of CSE. Vancouver:IEEE, 2009: 189194. [9]Mori R, Kawahara M. Super distribution: The concept and the architecture[J]. The Transactions of the IEICE, 1990,73(7):11331146. [10]邓锐,陈左宁. 基于策略嵌入和可信计算的完整性主动动态度量架构[J]. 计算机应用研究,2013,30(1):261264. DENG Rui, CHEN Zuoning. Policy embedded dynamic integrity active measurement architecture[J]. Application Research of Computers, 2013,30(1):261264. [11]Boyd C. Digital multisignatures[C]∥ Cryptography and Coding. Oxford: Oxford University Press, 1986: 241246. [12]Sandhu R, Bellare M, Ganesan R. Passwordenabled PKI: Virtual smartcards versus virtual soft tokens[C]∥ Proc of 1st Annual PKI Research Workshop. United States:NIST, 2002: 8996. |
[1] |
YANG Zhen,FU Zhuang,GUAN Enguang,XU Jiannan,TIAN Shihe,ZHENG Hui.
The Kinematic Analysis and Structure Optimization of MLattice Modular Robot [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1153-1159. |
[2] |
ZHAO Jun1,YU Haidong2.
Dynamic Analysis of TwoLink Flexible Manipulators Based on the Absolute Nodal Coordinate Formulation [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1160-1165. |
[3] |
ZHAO Ziren1,DU Shichang1,HUANG Delin1,REN Fei2,LIANG Xinguang2.
Modelling and Bottleneck Analysis of Product Quality in Transient Phase of MultiStage Manufacturing Systems Based on Markovian Chains [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1166-1173. |
[4] |
HUANG Xuangui.
Algorithm for Relatively Small Planted Clique with Small Edge Probability [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1202-1206. |
[5] |
LUO Jingjinga,YU Haidonga,ZHAO Chunzhanga,b,WANG Haoa,b.
Study on Motion Stability of Variable CrossSection Flexible Beams Based on the Absolute Nodal Coordinate Formulation [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1174-1180. |
[6] |
WANG Yibo1,HUANG Yixiang1,LI Bingchu1,LING Xiao1 ZHAO Shuai1,LIU Chengliang1,ZHANG Daqing2.
An Improved Modal Simulation Method for Switched Reluctance Motor Based on Static PreComputation [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1181-1188. |
[7] |
ZHOU Binghai,LI Ming.
Scheduling Method of Manufacturing Cells with Robot Restricted Processing [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1214-1219. |
[8] |
CHEN Jinping1,ZHANG Shusheng1,HE Weiping1,WANG Mingwei1,HUANG Hui2.
Feasible Change Path Search and Optimization Method Based on Driving Parameter Modeling [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1220-1227. |
[9] |
ZHOU Penghui,MA Hongzhan,CHEN Dongping,CHEN Mengyue,CHU Xuening.
Identification of Product Redesign Modules Based on Fuzzy Random Failure Mode and Effects Analysis [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1189-1195. |
[10] |
PENG Cheng,ZHU Jianyun,CHEN Li.
Mode Transition for a Hybrid Electric Vehicle Based on Model Reference Control [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1196-1201. |
[11] |
LIU Wei,YANG Chao .
A Study on Injection Mould Part Quotation Model Based on Back Propagation Neural Network [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1207-1213. |
[12] | CHEN Suting,WANG Zhuo,WANG Qi. Aerial Scene Classification Based on Nonlinear Scale Space [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1228-1234. |
[13] |
CHEN Ning,HE Xiaobin,GUI Weihua,YANG Chunhua.
Research on Image Encryption System Based on Chaotic Discrete Sequence [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1273-1280. |
[14] | LIU Kaia,ZHANG Liminb,ZHOU Lijuna. Design of Random Restricted Boltzmann Machine Group [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1235-1240. |
[15] |
ZHU Xinyao1,SONG Baowei2,XU Gang1,YANG Songlin1.
Research on Landing Strategy and Influencing Factors of an Autonomous Underwater Vehicle with Supporting Mechanism [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1241-1251. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||