The traditional access control model is not appropriate to do dynamic authorization when there are changes of trust value, organizational structure, attribute of the subject, time strategy, task or process and so on. ...
详细信息
The traditional access control model is not appropriate to do dynamic authorization when there are changes of trust value, organizational structure, attribute of the subject, time strategy, task or process and so on. In this condition, we need a dynamic authorization model according to these changes. The change of trust value is an important factor to do dynamic authorization in dynamic federation environment. This thesis gives a description of concept of trust, trust evaluation, dynamic authorization and proposes a trust evaluation model which can provide good support for dynamic authorization in federate environment.
Although many researchers have written about OFDMA transmission system,it needs more attention and analysis in next generation wireless *** paper is aimed at studying the performance analysis of OFDMA in WiMAX IEEE 80...
详细信息
Although many researchers have written about OFDMA transmission system,it needs more attention and analysis in next generation wireless *** paper is aimed at studying the performance analysis of OFDMA in WiMAX IEEE 802.16m and 3GPP LTE Advanced systems Communication in hybrid environment *** study further focuses on Downlink and Uplink ***,it summarizes simulation results of OFDMA transmission technique.
Compliance is a critical enterprise management concern, compliance measures are often implemented using polices. This paper proposed a general compliance policy model for security audit after the definition and descri...
详细信息
Compliance is a critical enterprise management concern, compliance measures are often implemented using polices. This paper proposed a general compliance policy model for security audit after the definition and description of security policy were given out. The model is suitable to express fine-gained audit policy based on periodical time constraints. It also provides a security audit implementation architecture based on the model.
To find an optimal elimination ordering for Bayesian networks, a multi-heuristic-based ant colony system named MHC-HS-ACS is proposed. MHC-HS-ACS uses a set of heuristics to guide the ants to search solutions. The heu...
详细信息
The uncertainty in selection of security assessment parameters heavily affects the accuracy and credibility of the assessment results. The method of selection based on opinion of group experts lacks the ability of des...
详细信息
The uncertainty in selection of security assessment parameters heavily affects the accuracy and credibility of the assessment results. The method of selection based on opinion of group experts lacks the ability of describing the uncertainty in the selection procedure, and the method based on interval matrixes does not measure the degree of credibility of the chosen matrix. This paper presents an algorithm of selecting security assessment parameters based on backward cloud in the cloud model. This algorithm has been applied to our design work of security assessment tools. The application of the algorithm improved the degree of credibility of the parameter selection procedure, indicating the correctness and effectiveness of the algorithm.
The hydration reaction of Portland cement paste has an important impact on the formation of microstructure and development of strength. However, simulating the evolution of hydration reaction is very difficult because...
详细信息
Virtual organization is a kind of advanced dynamic organizational model which can adapt the competitive market According to new demands that Virtual organization puts forwards on Trust Model and the lack of current re...
详细信息
Virtual organization is a kind of advanced dynamic organizational model which can adapt the competitive market According to new demands that Virtual organization puts forwards on Trust Model and the lack of current research, we proposed a kind of dynamic trust model of virtual organization which based on behavior. This paper deeply researched and specified follow aspects in Trust Model: the definition, relation attributes, expression, meaning of trust, the variety of trust relation, storage and management of trust database. This work provides a theoretical basis for our future work— to construct the trust-based access control model.
Although many researchers have written about OFDMA transmission system, it needs more attention and analysis in next generation wireless networks. This paper is aimed at studying the performance analysis of OFDMA in W...
详细信息
Although many researchers have written about OFDMA transmission system, it needs more attention and analysis in next generation wireless networks. This paper is aimed at studying the performance analysis of OFDMA in WiMAX IEEE 802.16m and 3GPP LTE Advanced systems Communication in hybrid environment systems. This study further focuses on Downlink and Uplink models. Finally, it summarizes simulation results of OFDMA transmission technique.
The variations in testing requirements often result in the problem of numerous test cases and low efficiency in regression testing. To solve this problem, a reduction method of testing requirements is proposed based o...
详细信息
Learning to rank is a new statistical learning technology for sorting certain *** existing approaches to this problem only considered the content of the objects when building a ranking model,the relationship between o...
详细信息
Learning to rank is a new statistical learning technology for sorting certain *** existing approaches to this problem only considered the content of the objects when building a ranking model,the relationship between objects are *** address this issue,in this paper a listwise approach using both the content information of objects and the relations between objects is proposed to build a ranking *** relationships between objects are represented as an affinity *** ranking function for an object depends not only on the content of the object but also on the relations between these *** surrogate loss function is defined as the likelihood loss and cross entropy loss respectively.A stochastic gradient descent search is employed to find the minimum value of the surrogate loss *** results show that the proposed method outperforms the baseline listwise methods ListMLE,*** addition,we also discussed about how to determin a ground sorting lists for objects,which is a key problem for listwise learning -to -rank approach.
暂无评论