期刊文献+
共找到2,232篇文章
< 1 2 112 >
每页显示 20 50 100
Antecedents of Social Network Trust in SNS Usage: The Moderating Role of Offline Familiarity
1
作者 Yu Wang 《Social Networking》 2017年第2期107-134,共28页
With the rapid development of social networks, there is a focus on marketing strategies and business models that are based on social media. In the academic world, scholars believe that online trust is a key factor con... With the rapid development of social networks, there is a focus on marketing strategies and business models that are based on social media. In the academic world, scholars believe that online trust is a key factor contributing to online purchasing behavior. This article explored several factors in social media trust and verified the moderating role of offline familiarity by using relevant research on online trust in conjunction with a structure equation model. The results show that independent variables such as reputation, SNS interaction, information quality, reciprocity, satisfaction and shared values have a positive influence on trust, whereas perceived similarity does not, and information quality is the most important factor. In addition, offline familiarity significantly moderates the relations between information quality, reciprocity, reputation, shared values and social media trust. This information is important to assist companies in developing an effective social network marketing strategy. 展开更多
关键词 OFFLINE FAMILIARITY SOCIAL network trust MODERATE Structure Equation Modeling
暂未订购
DRL-AMIR: Intelligent Flow Scheduling for Software-Defined Zero Trust Networks
2
作者 Wenlong Ke Zilong Li +5 位作者 Peiyu Chen Benfeng Chen Jinglin Lv Qiang Wang Ziyi Jia Shigen Shen 《Computers, Materials & Continua》 2025年第8期3305-3319,共15页
Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Define... Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Defined Network(SDN)provides solutions through centralized control and dynamic resource allocation,but the existing scheduling methods based on Deep Reinforcement Learning(DRL)are insufficient in terms of convergence speed and dynamic optimization capability.To solve these problems,this paper proposes DRL-AMIR,which is an efficient flow scheduling method for software defined ZTN.This method constructs a flow scheduling optimization model that comprehensively considers service delay,bandwidth occupation,and path hops.Additionally,it balances the differentiated requirements of delay-critical K-flows,bandwidth-intensive D-flows,and background B-flows through adaptiveweighting.Theproposed framework employs a customized state space comprising node labels,link bandwidth,delaymetrics,and path length.It incorporates an action space derived fromnode weights and a hybrid reward function that integrates both single-step and multi-step excitation mechanisms.Based on these components,a hierarchical architecture is designed,effectively integrating the data plane,control plane,and knowledge plane.In particular,the adaptive expert mechanism is introduced,which triggers the shortest path algorithm in the training process to accelerate convergence,reduce trial and error costs,and maintain stability.Experiments across diverse real-world network topologies demonstrate that DRL-AMIR achieves a 15–20%reduction in K-flow transmission delays,a 10–15%improvement in link bandwidth utilization compared to SPR,QoSR,and DRSIR,and a 30%faster convergence speed via adaptive expert mechanisms. 展开更多
关键词 Zero trust network software-defined networking deep reinforcement learning flow scheduling
在线阅读 下载PDF
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
3
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 trusted network behavioral predic-tive control SIMILARITY trust measurement
在线阅读 下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
4
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
在线阅读 下载PDF
Security Model Research Based on Trusted Computing in Ad Hoc Network 被引量:2
5
作者 林筑英 刘晓杰 +2 位作者 卢林 师蕾 谢刚 《China Communications》 SCIE CSCD 2011年第4期1-10,共10页
With the rapid development of wireless networks,the Ad Hoc networks are widely used in many fields,but the current network security solutions for the Ad Hoc network are not competitive enough.So the critical technolog... With the rapid development of wireless networks,the Ad Hoc networks are widely used in many fields,but the current network security solutions for the Ad Hoc network are not competitive enough.So the critical technology of Ad Hoc network applications shall be how to implement the security scheme.Here the discussions are focused on the specific solution against the security threats which the Ad Hoc networks will face,the methodology of a management model which uses trusted computing technology to solve Ad Hoc network security problems,and the analysis and verification for the security of this model. 展开更多
关键词 Ad Hoc network trusted computing network security
在线阅读 下载PDF
METrust: A Mutual Evaluation-based Trust Model for P2P Networks 被引量:3
6
作者 Chun-Ling Cheng Xiao-Long Xu Bing-Zhen Gao 《International Journal of Automation and computing》 EI 2012年第1期63-71,共9页
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo... It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors. 展开更多
关键词 Peer-to-peer (P2P) network REPUTATION trust model mutual evaluation similarity risk
在线阅读 下载PDF
An Extended Hierarchical Trusted Model for Wireless Sensor Networks 被引量:1
7
作者 DU Ruiying XU Mingdi ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1489-1492,共4页
Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading... Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward an extended hierarchical trusted architecture for wireless sensor network, and establishes trusted congregations by three-tier framework. The method combines statistics, economics with encrypt mechanism for developing two trusted models which evaluate cluster head nodes and common sensor nodes respectively. The models form logical trusted-link from command node to common sensor nodes and guarantees the network can run in secure and reliable circumstance. 展开更多
关键词 wireless sensor networks SECURITY trust REPUTATION
在线阅读 下载PDF
Social Networking Approach for Building Trust in E-commerce 被引量:1
8
作者 Mohammad H. Saraee Azar Shahgholian Parisa Mazrooei 《通讯和计算机(中英文版)》 2010年第6期49-53,共5页
关键词 社会网络 电子商务 信任度 网络方法 网上交易 业务功能 交易方式 集群化
在线阅读 下载PDF
Development of Trusted Network and Challenges It Faces 被引量:3
9
作者 Lin Chuang 1, Wang Yuanzhuo 1, Tian Liqin 1,2 (1. Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China 2. Department of Computer, North China Institute of Science and Technology, Beijing 101601, China) 《ZTE Communications》 2008年第1期13-17,共5页
As the information network plays a more and more important role globally, the traditional network theories and technologies, especially those related to network security, can no longer meet the network development req... As the information network plays a more and more important role globally, the traditional network theories and technologies, especially those related to network security, can no longer meet the network development requirements. Offering the system with secure and trusted services has become a new focus in network research. This paper first discusses the meaning of and aspects involved in the trusted network. According to this paper, the trusted network should be a network where the network’s and users’ behaviors and their results are always predicted and manageable. The trustworthiness of a network mainly involves three aspects: service provider, information transmission and terminal user. This paper also analyzes the trusted network in terms of trusted model for network/user behaviors, architecture of trusted network, service survivability and network manageability, which is designed to give ideas on solving the problems that may be faced in developing the trusted network. 展开更多
关键词 Development of trusted network and Challenges It Faces
在线阅读 下载PDF
Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model 被引量:5
10
作者 FU Cai HONG Fan LI Rui-xian HONG Liang CHEN Jing 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期188-192,共5页
In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public k... In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better. 展开更多
关键词 Ad Hoc networks self-organize bidirectional trust public key management.
在线阅读 下载PDF
Trust Degree of Web Services and Its Evaluation with Neural Network 被引量:2
11
作者 HUANG Baohua HU Heping LU Zhengding YAO Hanbing LI Ruixuan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1302-1305,共4页
The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the... The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the method, applicable neural network structure, neural network construc ting, input standardization, training sample constructing, and the procedure of evaluating trust degree of Web services with trained neural network are described. Experiments show that it is feasible and effective to evaluate trust degree of Web Service with neural network. 展开更多
关键词 Web services trust degree neural network
在线阅读 下载PDF
Trust-Based Context-Aware Mobile Social Network Service Recommendation 被引量:4
12
作者 XU Jun ZHONG Yuansheng +1 位作者 ZHU Wenqiang SUN Feifei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期149-156,共8页
The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, M... The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity. 展开更多
关键词 trust CONTEXT-AWARE mobile social network RECOMMENDATION
原文传递
A TRUST MECHANISM-BASED CHANNEL ASSIGNMENT AND ROUTING SCHEME IN COGNITIVE WIRELESS MESH NETWORKS WITH INTRUSION DETECTION 被引量:1
13
作者 Wu Guofeng Zhang Jing He Zhaopan 《Journal of Electronics(China)》 2010年第5期728-734,共7页
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ... Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively. 展开更多
关键词 Cognitive Wireless Mesh networks (CWMN) Intrusion detection trust mechanism Channel assignment ROUTING
在线阅读 下载PDF
A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks
14
作者 YU Genjian ZHENG Baoyu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1789-1792,共4页
Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the m... Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly. 展开更多
关键词 MANET(mobile ad hoe networks) MULTILEVEL trust algorithm
在线阅读 下载PDF
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
15
作者 Danwei Chen Xizhou Yu Xianghui Dong 《Wireless Sensor Network》 2010年第5期373-380,共8页
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inte... This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption. 展开更多
关键词 WIRELESS Sensor networks BETA trust Model trust ROUTING PROTOCOL network Security trust Evaluation
在线阅读 下载PDF
A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network
16
作者 Geetha V. K. Chandrasekaran 《Wireless Sensor Network》 2014年第9期173-183,共11页
The wireless sensor network is an emerging technology, which is used to sense and monitor the environment. As the nodes are deployed in an open environment, the security is one of the essential factors. The cryptograp... The wireless sensor network is an emerging technology, which is used to sense and monitor the environment. As the nodes are deployed in an open environment, the security is one of the essential factors. The cryptography techniques can ensure confidentiality, integrity and authentication. However, wireless sensor network also needs to deal with inside and outside attackers. To deal with outside attackers, attacks by compromised or malicious nodes, trust management system is suggested by many researchers in the area of wireless sensor network. Trust management system can be implemented in various applications for security management such as secure data aggregation, secure cluster head selection, trusted routing, access control, etc. Many researchers provide different kind of solutions for these secure applications based on trust management. However, to incorporate, all such applications on a single sensor node in the network, it is essential to design and develop a trust management system, which considers various aspects and applications of wireless sensor network. As a result, in this paper, we would like to propose a parameter and trust factor based secure communication framework and design a trust management system for wireless sensor networks. Our main contribution is to identify various parameters and trust factors which influences on trust in wireless sensor network and developing a framework for a trust management system based on various parameters and trust factors. The working of the proposed model is shown by simulation experiments conducted in MATLAB for the application of secure communication, data aggregation and intrusion detection in wireless sensor networks. 展开更多
关键词 Wireless Sensor network trust Management System BLACK HOLE SINKHOLE DOS trust Factors
在线阅读 下载PDF
Weapon system selection based on trust network and probabilistic hesitant fuzzy entropy
17
作者 JIA Qingyang DOU Yajie +2 位作者 XIANG Nan MA Yufeng YANG Kewei 《Journal of Systems Engineering and Electronics》 CSCD 2024年第6期1469-1481,共13页
In order to solve the problem of uncertainty and fuzzy information in the process of weapon equipment system selec-tion,a multi-attribute decision-making(MADM)method based on probabilistic hesitant fuzzy set(PHFS)is p... In order to solve the problem of uncertainty and fuzzy information in the process of weapon equipment system selec-tion,a multi-attribute decision-making(MADM)method based on probabilistic hesitant fuzzy set(PHFS)is proposed.Firstly,we introduce the concept of probability and fuzzy entropy to mea-sure the ambiguity,hesitation and uncertainty of probabilistic hesitant fuzzy elements(PHFEs).Sequentially,the expert trust network is constructed,and the importance of each expert in the network can be obtained by calculating the cumulative trust value under multiple trust propagation paths,so as to obtain the expert weight vector.Finally,we put forward an MADM method combining the probabilistic hesitant fuzzy entropy and grey rela-tion analysis(GRA)model,and an illustrative case is employed to prove the feasibility and effectiveness of the method when solving the weapon system selection decision-making problem. 展开更多
关键词 weapon system selection multi-attribute decision making(MADM) probabilistic hesitant fuzzy set(PHFS) trust network
在线阅读 下载PDF
Static and Dynamic Structure Characteristics of a Trust Network and Formation of User Trust in an Online Society
18
作者 Ying Li Hongduo Cao Ying Zhang 《Social Networking》 2018年第4期197-219,共23页
This study investigated the characteristics and formation of the online social trust network of Epinions.com, a general consumer review site. An analysis of the static structure of this social trust network revealed a... This study investigated the characteristics and formation of the online social trust network of Epinions.com, a general consumer review site. An analysis of the static structure of this social trust network revealed a high clustering coefficient, short average path length, and power-law degree distribution;it is therefore a small-world and scale-free trust network. The dynamic evolutionary characteristics of the online social network (OSN) were also examined. The results showed that the scale of the network followed a sigmoidal curve;the average degree of the network was nonconstant and changed into a bell-shaped distribution;the density of the network decreased and subsequently stabilized;and user trust diffusion in the network conformed to the Bass model. Finally, the formation of trust within the network was researched at the overall network (macro) and individual user (micro) levels. Compared with their accumulated contribution and reputation, user activeness had a larger effect on trust formation in OSNs, indicating a “diminishing returns” phenomenon. This phenomenon contrasts with the Matthew effect (i.e. , the more reputation a person has, the more likely he or she is to be trusted) in real-world social networks. 展开更多
关键词 trust network STATIC Structure Dynamic Evolution trust FORMATION Diminishing Returns
在线阅读 下载PDF
Research on the Trusted Energy-Saving Transmission of Data Center Network
19
作者 Yubo Wang Bei Gong Mowei Gong 《China Communications》 SCIE CSCD 2016年第12期139-149,共11页
According to the high operating costs and a large number of energy waste in the current data center network architectures, we propose a kind of trusted flow preemption scheduling combining the energy-saving routing me... According to the high operating costs and a large number of energy waste in the current data center network architectures, we propose a kind of trusted flow preemption scheduling combining the energy-saving routing mechanism based on typical data center network architecture. The mechanism can make the network flow in its exclusive network link bandwidth and transmission path, which can improve the link utilization and the use of the network energy efficiency. Meanwhile, we apply trusted computing to guarantee the high security, high performance and high fault-tolerant routing forwarding service, which helps improving the average completion time of network flow. 展开更多
关键词 data center network architecture energy-saving routing mechanism trusted computing network energy consumption flow average completion time
在线阅读 下载PDF
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
20
作者 R. Mohan Kumar A. V. Ram Prasad 《Circuits and Systems》 2016年第10期3228-3245,共19页
One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management. Most popular decision making systems used to collaborate ... One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management. Most popular decision making systems used to collaborate with a stranger are tackled by two different existing trust management systems: one is a policy-based approach which verifies the decision built on logical properties and functionalities;the other approach is reputation-based approach which verifies the decision built on physical properties and functionalities of WSN. Proofless authorization, unavailability, vagueness and more complexity cause decreased detection rate and spoil the efficacy of the WSN in existing approaches. Some of the integrated approaches are utilized to improve the significance of the trust management strategies. In this paper, a Compact Trust Computation and Management (CTCM) approach is proposed to overcome the limitations of the existing approaches, also it provides a strong objective security with the calculability and the available security implications. Finally, the CTCM approach incorporates the optimum trust score for logical and physical investigation of the network resources. The simulation based experiment results show that the CTCM compact trust computation and management approach can provide an efficient defending mechanism against derailing attacks in WSN. 展开更多
关键词 Wireless Sensor networks trust Management SECURITY Intrusion Detection System Malicious Attacks
在线阅读 下载PDF
上一页 1 2 112 下一页 到第
使用帮助 返回顶部