oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption  [PDF]
Taeho Jung,Xiang-Yang Li,Zhiguo Wan,Meng Wan
Computer Science , 2012, DOI: 10.1109/INFCOM.2013.6567070
Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute- Based Encryption (ABE) have been proposed recently. However, the privacy problem of cloud computing is yet to be solved. This paper presents an anonymous privilege control scheme AnonyControl to address the user and data privacy problem in a cloud. By using multiple authorities in cloud computing system, our proposed scheme achieves anonymous cloud data access, finegrained privilege control, and more importantly, tolerance to up to (N -2) authority compromise. Our security and performance analysis show that AnonyControl is both secure and efficient for cloud computing environment.
支持用户撤销的多授权机构的属性加密方案
Multi-authority and revocable attribute-based encryption scheme
 [PDF]

李艳平,齐艳姣,张凯,魏旭光
LI Yan-ping
, QI Yan-jiao, ZHANG Kai, WEI Xu-guang

- , 2018, DOI: 10.6040/j.issn.1671-9352.0.2017.399
Abstract: 摘要: 目前多数基于属性加密的云存储访问控制研究是基于单授权机构,系统内仅有一个授权机构为用户颁发属性密钥,可信而好奇的单授权机构会凭借用户提交的属性对用户的身份、职业等隐私信息进行判断和推测,特别是在单授权机构不可信或遭受恶意攻击的情况下,可能造成密钥泄露而导致云端数据被非法解密。为了避免上述两种安全问题,结合现有的多授权机构的思想,使不同权限的授权机构管理不同属性并进行属性相关密钥分发,大大降低了单一信任机构的工作量,解决了单授权机构下的密钥泄露或滥用问题,同时提高了用户的隐私数据保护;通过访问树技术实现了AND、OR及Threshold灵活访问策略,且将用户身份标识设置在访问树中来实现用户的撤销,撤销出现后只需更新部分密文而无需更新属性密钥,因而减少了计算开销。在标准模型下证明了该方案在选择身份属性攻击模型下是安全的,其安全性规约到判定性双线性Diffie-Hellman(decisional bilinear Diffie-Hellman, DBDH)问题。
Abstract: Most of the existing attribute-based encryption schemes are based on a single authority. That is, there is only one authority in the system to issue the key to the user. The curious authority will speculate the user's identity, occupation and other private information by the user's attributes. In particular, if the single authority suffered malicious attacks, it maybe cause the leakage of private key and the breach of cloud data confidentiality. In order to avoid the above two kinds of problems, multi-authority is introduced in this paper. The different authorities manage different attributes and distribute the attributes key to users, which greatly decreases the single authority's workload, improves the protection of user privacy data and solves the key escrow under a single or abuse authority. AND, OR and Threshold are flexible realized by using the access tree, and the user identity is set in the access tree to achieve the user's direct revocation. When the revocation occurs, the whole system only needs to update parts of the ciphertext without updating the attribute key, thus reducing the computational overhead of the cloud storage message. Finally, the proposed scheme is proved secure under the chosen identity attribute attack in the standard model, and the security of the scheme is built on the hardness assumption of decision bilinear Diffie-Hellman(DBDH)problem
Verifiable attribute base encryption scheme with multi-authority
一种多认证机构可验证的属性基加密方案

CHEN Qin,DANG Zheng-qin,ZHANG Jin-man,MA Dan-dan,
陈勤
,党正芹,张金漫,马丹丹

计算机应用研究 , 2012,
Abstract: Aiming at the security issues caused by the central authority in attribute base encryption, this paper proposed a noble multi-authority verifiable attribute base encryption scheme. Compared with other schemes, the central authority was omitted in this scheme which solved the problem that the whole system would crash once the central authority was destroyed, using the technology of making each authority to generate their own master keys parts as well as their public and private keys independently. So the security of the system was improved. At the same time,it verified the correctness of the ciphertext and the keys. In addition, it gave the verification and security analysis.
在必然与巧合之间——马伯里诉麦迪逊案解读  [PDF]
胡锦光
法学家 , 2006,
Abstract: 美国宪法虽然没有明确规定司法机关具有违宪审查权,但司法机关拥有违宪审查权具有坚实的政治基础、文化基础和法律基础。马歇尔通过“马伯里诉麦迪逊案”这一千载难逢的绝妙的案件,开创了司法机关拥有违宪审查权的先例。
基于主客观赋权法的多目标多属性决策方法
Multiple objective and attribute decision making based on the subjective and objective weighting
 [PDF]

宋冬梅, 刘春晓, 沈晨, 石学法, 臧琳, 冯文强
SONG Dongmei
, LIU Chunxiao, SHEN Chen, SHI Xuefa, ZANG Lin, FENG Wenqiang

- , 2015, DOI: 10.6040/j.issn.1672-3961.0.2014.306
Abstract: 摘要: 针对多目标多属性决策方法中,传统的主观赋权法决策者主观偏好过强,而客观赋权法又过多地依赖实测数据的局限性,利用模糊数学原理,提出一种新的主客观赋权方法。主观赋权部分具有考察决策者悲观、中立、乐观3种评价态度的优点,客观赋权部分主要基于CRITIC法和熵值法,充分考虑到数据的离散性、相关性和对比强度。利用线性组合法和乘法合成归一法对新提出的主客观权重进行融合,并以通信设备的抗干扰能力评价为例进行试验分析,证明了该方法的可行性和实用性。
Abstract: For main defects of traditional subjective weighing and objective weighing method in the process of multi-objective and multiple attribute decision, a new weight way combined subjective and objective weighting method was proposed. Subjective weigh method has advantages of considering three different attitudes (pessimistic, neutral, optimistic) of the policy makers. Objective weighting method was based on the CRITIC method and the Entropy value method, which fully considered the discrete, correlation and contrast intensity of the data. Finally, linear group legal and multiplication operator were used to combine subjective and objective weighting method. The feasibility and practicability of the proposed method was proved by the experiment of assessment on the anti-interference ability of the communication equipment
授人以鱼 不如授人以渔
何仁生,陈小林,熊文元,赵英
现代物理知识 , 2005,
Abstract: 著名物理学家 严济慈与大学生对 话时强调:不在于 "学会",而在于"会 学"。因此,教师要有新的理念,要教给学生有效的 学习方法,不能急功近利、停留在嘴上,而应着眼未 来、在行动上落实。教师要把握好"授人以鱼不如授 人以渔"的教学原则。在教学中想方设法使学生进 入"会学"的境界,使学生在知识的海洋中"捕捞"得 法,"鳖篓"里的"鱼",犹如泉涌。只要学生获得了打 开知识宝库的钥匙,就能更好地建立掌握新知识、新 技能的支撑平台和发展空间。学生的知识和技能就 会不断有新的增长点、创新能力就会不断得到提
“被遗忘权”探析  [PDF]
徐家力
- , 2017,
Abstract: “冈萨雷斯诉谷歌案”的判决使在欧洲处于早期权利形态的“被遗忘权”成为网络社会中的一项正式权利,同时也是在司法实践中具有可操作性的一项民事权利。通过探究“被遗忘权”提出和兴起的历程,对国内外有关立法进行对比,其目的在于给“被遗忘权”本土化路径的探索提供思路。
“Gonzales v.Google case” decision making in the early forms of rights in Europe “right to be forgotten” became an official right in the network society,but also in the judicial practice is the civil right of operation.By exploring the history of “the right to be forgotten”,and the relevant laws at home and abroad are compared,the purpose is to provide an idea for the exploration of the localization path of the right to be forgotten.
分配结构与潜在效率:剩余索取权分割模型——基于剩余控制权与权威排序的设计
Distribution Structure and Potential Efficiency: Residual Claims Division Model Based on Residual Control Right and Authority Ranking
 [PDF]

何应期,朱小燕,王玉峰
- , 2017,
Abstract: 剩余控制权有转换为剩余索取权的动机。现实的剩余索取权分割与剩余控制权结构之间并不存在稳定的匹配关系,权威排序是影响剩余控制权转向剩余索取权的重要变量。据此构建剩余索取权分割模型,研究分配结构对有效剩余控制权与有效剩余索取权的影响。结果表明,若权威排序至少为三级,剩余索取权分割主体的趋利选择,倾向于减少有效剩余控制权与有效剩余索取权;以剩余控制权为基础的剩余索取权分割结构,存在未实现的潜在效率。调整分配结构,是“激发”潜在效率的可能途径。
Residual control right can be transferred to residual claims. There is no stable relationship to match the divisions of residual claims and residual control right structure. The authority ranking is an important variable to influence the transfer from residual control right to residual claims. The residual claims division model is established in this paper accordingly to research the effects of distributional structure to efficient residual control rights and efficient residual claims. The results show that if authority ranking is larger than level three, the division entities of residual claims tend to reduce efficient residual control right and efficient residual claims because of theirs profit-orientation. There is potential efficiency exists in the division structure of residual claims based on residual control rights. The adjustment of distribution structure is a possible way to motivate potential efficiency.
美国证据排除规则的转向——以“哈德逊诉密西根州”案为视角  [PDF]
王景龙
比较法研究 , 2015,
Abstract: 美国联邦最高法院对待排除规则的态度在2006年的“哈德逊诉密西根州”案中发生了根本性改变,作出了“排除规则一直是我们最后的手段,而不是首选”的著名论断,声称其他救济措施可以完全替代排除规则,强烈暗示排除规则已经过时了、没有存在的必要了。随后的赫瑞恩案、戴维斯案及金案等重要判例延续了这一立场,纷纷实质性地限制了排除规则的适用,直接导致了排除规则的转向。为摆脱警察滥权的困扰,初步建立证据排除规则的中国对待非法证据的态度也发生了转向。转变的方向与美国相反,但殊途同归。
试析“吴湘之案”  [PDF]
黄会奇
东南文化 , 2004,
Abstract: ????唐宣宗大中元年,宣宗、牛党等利用吴湘案判决中的小失误为吴湘翻案,说李德裕、李绅挟私报复,吴湘之案是一大冤案,而实际上翻案的目的不过是为迫害李德裕、李绅等找一个借口罢了,吴湘因贪赃和强娶而被杀,并不冤枉。
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.