排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model, this paper implements a mandatory access control (MAC) framework applicable to multi-level security (MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework, and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on
Virt-BLP model, while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present, our MAC framework fills the blank by applying Virt-BLP model to Xen, which is better than current researches to guarantee the security of communication between virtual machines (VMs). The experimental results show that our MAC framework is effective to manage the communication between VMs. 相似文献
2.
协同过滤推荐系统中,推荐结果对用户偏好信息的敏感性使得推荐系统易受到人为攻击,即托攻击.恶意用户可以任意使用多重身份,或者是多个人来参与,都能注入恶意信息到推荐系统中.这类攻击严重影响了推荐系统的鲁棒性和准确性.这里深入分析了托攻击,结合主成分分析和变量选择方法,提出一个高精确度鲁棒的协同过滤系统架构,以保护推荐系统抵御用户概貌注入攻击.最后,通过实验验证表明该新型的高精确度的协同过滤系统可以取得更好的检测精度. 相似文献
3.
本文分析了离散随机变量熵与方差及有关微分熵的某种关系,给出了离散随机变量熵的一个上界,改进了T.M.Cover与J.A.Thomas关于离散熵的上界的已有结果[1],并以图和表的方式举出一些实例加以比较。 相似文献
4.
传统的网络信息流传输方式是存储转发,但通常无法达到通信的最大流界。为了实现更高的传输效率,Ahlswede等人提出采用网络编码的方法,不但可以提高网络吞吐量,而且在普适性、鲁棒性、可靠性和安全性等方面都具有优势。网络中的信道通常是有噪声的,目前网络编码理论的研究重点包括经典多用户信道、网络-信道编码分离和网络安全编码等问题。 相似文献
6.
At present, there are few security models which control the communication between virtual machines (VMs). Moreover, these models are not applicable to multi-level security (MLS). In order to implement mandatory access control (MAC) and MLS in virtual machine system, this paper designs Virt-BLP model, which is based on BLP model. For the distinction between virtual machine system and nonvirtualized system, we build elements and security axioms of Virt-BLP model by modifying those of BLP. Moreover, comparing with BLP, the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject. As a result, Virt-BLP model supports MAC and partial discretionary access control (DAC), well satisfying the requirement of MLS in virtual machine system.As space is limited, the implementation of our MAC framework will be shown in a continuation. 相似文献
7.
8.
9.
研究并分析现有的一些基于TPM的虚拟机安全协议,分析协议的一些不足和不完善的地方,针对这些协议的不足,提出一种改进的协议,并补充一种新的协议。 相似文献
10.
血流动力学和形态学被认为是颅内动脉瘤破裂的主要因素,探索它们之间的关系对于建立一种可供临床医生评估动脉瘤破裂风险可能性的方法是十分必要的.通过对分布于190名患者中的198例侧脑动脉瘤(96例破裂,102例未破裂)进行形态学分析和计算流体动力学研究,计算8个形态学参数和6个血流动力学参数,并评估其统计学意义,观察到参数... 相似文献