Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 1 )

2019 ( 93 )

2018 ( 743 )

2017 ( 753 )

Custom range...

Search Results: 1 - 10 of 66340 matches for " SHI Wen-Chang "
All listed articles are free for downloading (OA Articles)
Page 1 /66340
Display every page Item
On Methodology of Modeling the Trust Base in Operating Systems

SHI Wen-chang,

计算机科学 , 2010,
Abstract: Advocates the philosophy that operating systems are of indispensable significance to make applications trusled. Elaborates the concept of Trust Base in Operating System (TBOS) with a focus on Web applications. Discusses research methods for modeling the TI30S with a longing for ensuring that the TBOS is trusted. Proposes the TBOS archilecture that consists of three main parts, which are the Trust Monitoring Core Engine, the In-Kernel Trust Monitor and the Out of-Kernel Trust Monitor. Proposes a research guideline that is to exploit the potential of hardware and reduce the size of software. States key issues and key technictues in modeling the TBOS. Establishes the methodology foundalion of modeling the TBOS from the aspects of model construction method, trust monitoring method, inter-domain collaboration method, protection-by-isolation method, hardware features abstraction method and software size minimization method.
Security Policy Lattice and the Modification of a Lattice

SHI Wen-Chang,

计算机科学 , 2004,
Abstract: To support the flexibility of security policies is an important goal of modern secure operating systems. Security policy lattice provides a good way for the research on the flexibility of security policies. Through the analysis of research results achieved in the Distributed Trusted Operating System (DTOS) project,this paper discusses the fundamental concept of security policy lattice,introduces a practical security policy lattice designed in the DTOS project,and presents a modification to that security policy lattice to eliminate an incorrectness existsing in it.
An approach for compliance validation of TPM through applications

CUI Qi,SHI Wen-Chang,

中国科学院研究生院学报 , 2008,
Abstract: Security involves both protection and compliance. Although the Trusted Computing Group (TCG) has defined specifications for Trusted Computing, including those of Trusted Platform Module (TPM), criteria on compliance testing is still not available. In this paper, a test mechanism checking TPM commands is instrumented into TPM applications, which will validate TPM’s conformance to specifications before its functional execution. Based on this, the initial idea of a chain of compliance is also discussed to enhance the trustworthiness of computing platforms by verifying the conformance of their components.
Survey of Research on Cloud Infrastructure Security

HUANg Ying,SHI Wen-chang,
黄 瑛

计算机科学 , 2011,
Abstract: Cloud computing is a worldwide hot topic nowadays. It will probably cause a new revolution to information technologies. But meanwhile it induces new security problems as well. Standing on the bottom layer of a cloud computing environment, this paper carried out research on security of cloud infrastructure. It observed the statcof-thcart of cloud infrastructure security, analyzed security problems existing in cloud infrastructure from a wide perspective. In combination with a technical framework of cloud infrastructure security, it discussed principle key technictues of cloud infrastructure security. The motivation of the paper is to lay a solid ground for solving security problems in cloud infrastructure as well as in the whole cloud computing environment
Research and Implementation of a Trusted File System CIVFS Based on TPM

ZHANG Wei-Wei,SHI Wen-Chang,

计算机科学 , 2008,
Abstract: This paper proposes a method for utilizing the trusted computing technology to enhance the trust of file system,and designs and implements a prototype system CIVFS based on Linux.CIVFS combines two file protection measures:encryption and integrity verification.With the stackable file system technology,CIVFS is implemented in Linux kernel.CIVFS adds file encryption and integrity verification modules to the file system,and strengthens the security of system components and data with the functions of trusted computing and secure storage supplied by TPM chip.
Research on Nontraditional Development Model of Secure Operating Systems

SHI Wen-Chang SUN Yu-Fang,

计算机科学 , 2003,
Abstract: The TCSEC-based traditional development model of secure operating systems is exhibiting more and more obviously inability in the rapidly changing world of computer applications. With an experiment of building a secure operating system in accordance with the philosophy of the international standard for computer security evaluation,i. e. the Common Criteria, research on nontraditional development model of secure operating systems is conducted in this paper.
History Sensitivity of the Multilevel Security Policies

SHI Wen-Chang,SUN Yu-Fang,

软件学报 , 2003,
Abstract: 对安全政策灵活性的支持是现代安全操作系统追求的目标之一,DTOS(distributed trusted operating system)项目提出了安全政策格的思想,为安全政策灵活性的研究提供了一种很好的手段.然而,DTOS项目给出的安全政策的格描述把多级安全性(multi-level security,简称MLS)政策认定为静态安全政策.首先,从理论上构造MLS政策的一个实施策略,说明MLS政策具有历史敏感性,从而具有动态特征,不能简单地作为静态安全政策对待.同时,给出所构造的实施策略的实现算法,说明该实施策略与常规实施策略具有相同的复杂度,是一个实用的实施策略.由此证明,可以找到合理、灵活、实用的实施策略,使MLS政策具有历史敏感性,从而证明把MLS政策认定为静态安全政策的不合理性.
PSO Algorithm Particle Filters for Improving the Performance of Lane Detection and Tracking Systems in Difficult Roads
Wen-Chang Cheng
Sensors , 2012, DOI: 10.3390/s121217168
Abstract: In this paper we propose a robust lane detection and tracking method by combining particle filters with the particle swarm optimization method. This method mainly uses the particle filters to detect and track the local optimum of the lane model in the input image and then seeks the global optimal solution of the lane model by a particle swarm optimization method. The particle filter can effectively complete lane detection and tracking in complicated or variable lane environments. However, the result obtained is usually a local optimal system status rather than the global optimal system status. Thus, the particle swarm optimization method is used to further refine the global optimal system status in all system statuses. Since the particle swarm optimization method is a global optimization algorithm based on iterative computing, it can find the global optimal lane model by simulating the food finding way of fish school or insects under the mutual cooperation of all particles. In verification testing, the test environments included highways and ordinary roads as well as straight and curved lanes, uphill and downhill lanes, lane changes, etc. Our proposed method can complete the lane detection and tracking more accurately and effectively then existing options.
Research on Access Control Based on Source of Information Flow

LI Wei-nan,LI Han-chao,SHI Wen-chang,

计算机科学 , 2011,
Abstract: Due to the impact of information flow on system integrity, explored ways to enforce access control with consideration of information flow. Proposed a model for Access Control based on Source of Information Flow(ACSIE),in which, source of information flow refers to the entity that is a starting point of the flow. Source of information flow was expressed via set of users. Integrity level was described through sources of information flows. Dominance relationship of integrity levels was defined according to inclusion relationship of sets. Access control rules were constructed based on information flows. Integrity constrained subjects and constrained sets were introduced to improve adaptability of the model. Existing system information may be utilized effectively in implementing the model, hence, complexity of system configuration can be reduced,and system usability can be improved.
Approach for Research on Fine-grained Chain of Trust

SHI Wen-chang,SHAN Zhi-yong,LIANG Bin,LIANG Zhao-hui,DONG Ming,

计算机科学 , 2008,
Abstract: The state of the art of relevant research on chain of trust is figured out.The concepts of fine-grained chain of trust and fine-grained chain of trust of system software are put forward.It is argued that only fine-grained chain of trust can describe the genuine scenario of real world application.According to complexity of the problem space in question,a two-step approach is proposed for modeling fine-grained chain of trust,in which the first step is to model the fine-grained chain of trust of system softwar...
Page 1 /66340
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.