Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Network interconnection model based on trusted computing
LIU Yibo YIN Xiaochuan GAO Peiyong ZHANG Yibo
Journal of Computer Applications    2014, 34 (7): 1936-1940.   DOI: 10.11772/j.issn.1001-9081.2014.07.1936
Abstract213)      PDF (767KB)(521)       Save

Problem of intranet security is almost birth with network interconnection, especially when the demand for network interconnection is booming throughout the world. The traditional technology can not achieve both security and connectivity well. In view of this,a method was put forward based on trusted computing technology. Basic idea is to build a trusted model about the network interconnection system,and the core part of this model is credible on access to the person's identity and conduct verification:first, the IBA algorithm is reformed to design an cryptographic protocol between authentication system and accessors,and the effectiveness is analyzed in two aspects of function and accuracy; second,an evaluation tree model is established through the analysis of the entity sustainable behavior, so the security situation of access terminals can be evaluated.At last,the evaluation method is verified through an experiment.

Reference | Related Articles | Metrics
New algorithm based on repeat sequence deletion
bo yin hua jiang
Journal of Computer Applications   
Abstract901)      PDF (441KB)(981)       Save
Aiming at the current de-duplication algorithms, two repeated sequences (RS)extracting algorithms were compared and analyzed. Since STC has favorable performance in considering time cost and the inverted index method is superior in terms of spatial complexity, STC was used to improve RS algorithm. Experiment results show that this method can find similar Web pages efficiently. This algorithm can reach a high precision in mono-language deletion of duplicated Web pages, and this algorithm can also reach a maximum precision when it is applied to deletion of duplicated web pages.
Related Articles | Metrics