期刊文献+
共找到3,953篇文章
< 1 2 198 >
每页显示 20 50 100
IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-Encryption
1
作者 Han-Yu Lin Tung-Tso Tsai Yi-Chuan Wang 《Computers, Materials & Continua》 2026年第3期431-447,共17页
Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud ar... Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud architecture,makes it difficult to quickly respond to the demands of IoT applications and local computation.To make up for these deficiencies in the cloud,fog computing has emerged as a critical role in the IoT applications.It decentralizes the computing power to various lower nodes close to data sources,so as to achieve the goal of low latency and distributed processing.With the data being frequently exchanged and shared between multiple nodes,it becomes a challenge to authorize data securely and efficiently while protecting user privacy.To address this challenge,proxy re-encryption(PRE)schemes provide a feasible way allowing an intermediary proxy node to re-encrypt ciphertext designated for different authorized data requesters without compromising any plaintext information.Since the proxy is viewed as a semi-trusted party,it should be taken to prevent malicious behaviors and reduce the risk of data leakage when implementing PRE schemes.This paper proposes a new fog-assisted identity-based PRE scheme supporting anonymous key generation,equality test,and user revocation to fulfill various IoT application requirements.Specifically,in a traditional identity-based public key architecture,the key escrow problem and the necessity of a secure channel are major security concerns.We utilize an anonymous key generation technique to solve these problems.The equality test functionality further enables a cloud server to inspect whether two candidate trapdoors contain an identical keyword.In particular,the proposed scheme realizes fine-grained user-level authorization while maintaining strong key confidentiality.To revoke an invalid user identity,we add a revocation list to the system flows to restrict access privileges without increasing additional computation cost.To ensure security,it is shown that our system meets the security notion of IND-PrID-CCA and OW-ID-CCA under the Decisional Bilinear Diffie-Hellman(DBDH)assumption. 展开更多
关键词 Equality test proxy re-encryption IDENTITY-BASED REVOCABLE fog computing
在线阅读 下载PDF
Evolve and Revoke:A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution
2
作者 Han-Yu Lin Tung-Tso Tsai Yi-Jia Ye 《Computers, Materials & Continua》 2026年第4期1565-1583,共19页
Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized ma... Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized management and transmission latency of the cloud makes it difficult to support real-time processing and distributed access structures.As a result,fog computing and the Internet of Things(IoT)have emerged as crucial applications.Fog-assisted proxy re-encryption is a commonly adopted technique for sharing cloud ciphertexts.It allows a semitrusted proxy to transforma data owner’s ciphertext into another re-encrypted ciphertext intended for a data requester,without compromising any information about the original ciphertext.Yet,the user revocation and cloud ciphertext renewal problems still lack effective and secure mechanisms.Motivated by it,we propose a revocable conditional proxy re-encryption scheme offering ciphertext evolution(R-CPRE-CE).In particular,a periodically updated time key is used to revoke the user’s access privileges while an access condition prevents a malicious proxy from reencrypting unauthorized ciphertext.We also demonstrate that our scheme is provably secure under the notion of indistinguishability against adaptively chosen identity and chosen ciphertext attacks in the random oracle model.Performance analysis shows that our scheme reduces the computation time for a complete data access cycle from an initial query to the final decryption by approximately 47.05%compared to related schemes. 展开更多
关键词 REVOCABLE proxy re-encryption conditional access control ciphertext evolution fog computing
在线阅读 下载PDF
Blockchain-Enabled Data Secure Sharing with Privacy Protection Based on Proxy Re-Encryption in Web3.0 Applications 被引量:1
3
作者 Ma Jiawei Zhou Haojie +2 位作者 Wang Sidie Song Jiyuan Tian Tian 《China Communications》 2025年第5期256-272,共17页
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the... With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance. 展开更多
关键词 blockchain data sharing privacy protection proxy re-encryption WEB3.0
在线阅读 下载PDF
The relationship between proxy decision-making content and cues by families of patients with malignant brain tumor: A descriptive qualitative study
4
作者 Runa Tokunaga Fumiyo Ishikawa 《International Journal of Nursing Sciences》 2025年第2期169-175,共7页
Objectives This study aimed to clarify the relationship between the content of proxy decision-making made by families of patients with malignant brain tumors regarding treatment policies and daily care and the cues le... Objectives This study aimed to clarify the relationship between the content of proxy decision-making made by families of patients with malignant brain tumors regarding treatment policies and daily care and the cues leading to those decisions.Methods Semi-structured personal interviews were used to collect data.Seven family members of patients with malignant brain tumors were selected to participate in the study by purposive sampling method from June to August 2022 in the Patient Family Association of Japan.Responses were content analyzed to explore the relationship between the content of decisions regarding“treatment policies”and“daily care”and the cues influencing those decisions.Semi-structured interviews were analyzed by using thematic analysis.Results The contents of proxy decisions regarding“treatment policies”included implementation,interruption,and termination of initial treatments,free medical treatments,use of respirators,and end-of-life sedation and included six cues:treatment policies suggested by the primary physician,information and knowledge about the disease and treatment obtained by the family from limited resources,perceived life threat from symptom worsening,words and reactions from the patient regarding treatment,patient’s personality and way of life inferred from their treatment preferences,family’s thoughts and values hoping for better treatment for the patient.Decisions for“daily care”included meal content and methods,excretion,mobility,maintaining cleanliness,rehabilitation,continuation or resignation from work,treatment settings(outpatient or inpatient),and ways to spend time outside and included seven cues:words and thoughts from the patient about their way of life,patient’s reactions and life history inferred from their preferred way of living,things the patient can do to maintain daily life and roles,awareness of the increasing inability to do things in daily life,family’s underlying thoughts and values about how to spend the remaining time,approval from family members regarding the care setting,advice from medical professionals on living at home.Conclusions For“treatment policies,”guidelines from medical professionals were a key cue,while for“daily care,”the small signs from the patients in their daily lives served as cues for proxy decision-making.This may be due to the lack of information available to families and the limited time available for discussion with the patient.Families of patients with malignant brain tumors repeatedly use multiple cues to make proxy decision-making under high uncertainty.Therefore,nurses supporting proxy decision-making should assess the family’s situation and provide cues that facilitate informed and confident decisions. 展开更多
关键词 Brain neoplasms FAMILY Nurses CUES proxy decision-making
暂未订购
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
5
作者 Xixi Yan Jing Zhang Pengyu Cheng 《Computers, Materials & Continua》 2025年第4期1399-1414,共16页
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources. 展开更多
关键词 Cloud service conditional proxy re-encryption user revocation weighted attribute
在线阅读 下载PDF
Are Elemental Salinity Proxies Worth Their Salt?
6
作者 Thomas J.Algeo Wei Wei +2 位作者 Zhanhong Liu Yi Song Huyue Song 《Journal of Earth Science》 2025年第4期1848-1852,共5页
Salinity is a fundamental variable of watermass chemistry,often varying strongly in coastal,estuarine,lagoonal,restricted-marine basinal,and non-freshwater lacustrine systems(Figure 1).Salinity variation commonly cont... Salinity is a fundamental variable of watermass chemistry,often varying strongly in coastal,estuarine,lagoonal,restricted-marine basinal,and non-freshwater lacustrine systems(Figure 1).Salinity variation commonly controls other watermass properties(e.g.,redox,temperature,p H,and chemical composition)as well as nutrient levels(and thus bioproductivity). 展开更多
关键词 PROXIES SALINITY estuarine systems lagoonal systems temperature non freshwater lacustrine systems redox coastal systems
原文传递
受贿罪新型隐性化背景下既遂与未遂的区分
7
作者 何荣功 刘寅超 《南大法学》 2026年第1期38-56,共19页
贿赂犯罪的新型隐性化为受贿罪的认定和惩治带来了困难。对于受贿罪的既遂标准,刑法理论与实务坚持的“实际控制财物说”没有必要改变,但应充分考虑行贿受贿对立统一的结构关系、从严惩治受贿罪的刑事政策以及当下贿赂犯罪新型隐性化特... 贿赂犯罪的新型隐性化为受贿罪的认定和惩治带来了困难。对于受贿罪的既遂标准,刑法理论与实务坚持的“实际控制财物说”没有必要改变,但应充分考虑行贿受贿对立统一的结构关系、从严惩治受贿罪的刑事政策以及当下贿赂犯罪新型隐性化特点,重视对“实际控制”的实质理解。代持型受贿罪的既未遂认定要重视代持人与行贿受贿双方的人身、财产以及其他利益关系。银行卡受贿罪的既未遂认定应注意结合银行卡给付、银行卡代持、银行卡共有、银行卡失效等具体类型判断行为人是否实际控制财物。受贿罪的既未遂要严格依法认定,避免简单地以认定既遂更有利于从严惩治受贿犯罪为由导致既遂时点的不当提前。 展开更多
关键词 受贿罪 犯罪既遂 实际控制 代持型受贿 银行卡受贿
在线阅读 下载PDF
面向终端用户的轻量级加密文件安全共享方案
8
作者 姜林美 朱文龙 《华侨大学学报(自然科学版)》 2026年第2期146-152,共7页
针对传统文件共享方案因流程繁冗导致效率低下的问题,设计并实现了一种基于区块链的轻量级加密文件安全共享方案。该方案采用代理重加密技术,以区块链节点替代传统代理服务器执行重加密操作;通过星际文件系统(IPFS)底层点对点(P2P)网络... 针对传统文件共享方案因流程繁冗导致效率低下的问题,设计并实现了一种基于区块链的轻量级加密文件安全共享方案。该方案采用代理重加密技术,以区块链节点替代传统代理服务器执行重加密操作;通过星际文件系统(IPFS)底层点对点(P2P)网络,实现了数据所有者与使用者之间的直接通信,显著降低了系统通信开销。实验结果表明:文中方案在保证用户数据安全性的前提下,兼具操作简洁性和终端友好性,有效提升了文件共享效率。 展开更多
关键词 数据共享 代理重加密 星际文件系统(IPFS) 区块链 终端用户
在线阅读 下载PDF
基于Proxy的网络计费系统的设计与实现 被引量:15
9
作者 易正强 王耀军 《计算机工程》 CAS CSCD 北大核心 2001年第2期166-168,共3页
讨论在校园网环境下的网络计费,对基于Proxy的网络计费与管理进行了详细设计,给出了巨量数据的处理方法。
关键词 校园网 网络计费系统 代理服务器 proxy INTERNE
在线阅读 下载PDF
一种基于Proxy的Web应用安全漏洞检测方法及实现 被引量:6
10
作者 王鹃 李俊娥 刘珺 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2005年第5期135-140,共6页
指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL... 指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL代码插入、跨站点脚本算法的JAVA语言实现. 展开更多
关键词 WEB应用安全 漏洞检测 proxy JAVA
在线阅读 下载PDF
基于论元关联和图神经网络的篇章级多事件抽取模型
11
作者 廖涛 郝娟娟 《湖北民族大学学报(自然科学版)》 2026年第1期35-40,共6页
为解决篇章级多事件抽取中事件及论元角色间全局语义关联缺失、文档信息利用不足的问题,提出了基于论元关联和图神经网络的篇章级多事件抽取(document-level multi-event extraction based on argument correlation and graph neural ne... 为解决篇章级多事件抽取中事件及论元角色间全局语义关联缺失、文档信息利用不足的问题,提出了基于论元关联和图神经网络的篇章级多事件抽取(document-level multi-event extraction based on argument correlation and graph neural network,DEEACG)模型。首先,使用基于变换器的双向编码器表示(bidirectional encoder representations from Transformers,BERT)模块获取实体,并引入实体共事件性预测任务,增强实体间的语义关联。接着,引入可学习的事件代理节点,构建包含实体、上下文和代理节点的异构图,通过特征线性调制图神经网络(graph neural network with feature-wise linear modulation,GNN-FiLM)与多头自注意力机制,实现多事件间的全局交互与语义融合。然后,通过多层感知机进行事件类型检测。最后,构建双投影空间建模论元关联,采用Bron-Kerbosch算法提取图中极大团作为候选论元组合,并结合多头注意力实现论元角色分类。结果表明,DEEACG模型在中文金融公告(Chinese financial announcements,ChFinAnn)数据集的多事件抽取任务中性能明显提升,与关系增强文档级事件抽取(relation-enabled document-level event extraction,ReDEE)模型相比,F1均值提升了2.1个百分点。该研究证实DEEACG模型能有效捕捉多事件间语义关联,适用于篇章级多事件抽取任务。 展开更多
关键词 代理节点 异构图 图神经网络 多头自注意力 论元关联
在线阅读 下载PDF
基于MS Proxy Server的网络计费系统的实现 被引量:2
12
作者 邹刚 敖永红 +1 位作者 柯水洲 曹承倜 《计算机工程与应用》 CSCD 北大核心 2003年第6期151-154,共4页
文中介绍了代理服务器的计费方式,阐述了基于MSProxyServer的网络计费系统的设计与实现。
关键词 MS proxy Server 网络计费系统 计算机网络 网络管理 防火墙 代理服务器
在线阅读 下载PDF
基于策略DNS和HTTP Proxy的多宿主网络服务部署的研究 被引量:2
13
作者 王子荣 胡浩 +1 位作者 尹绍锋 王宇科 《计算机工程与科学》 CSCD 北大核心 2014年第2期238-243,共6页
针对目前常用的多宿主网络服务部署方法中存在的由于ISP网络地址集的变化或DNS配置等因素会造成服务访问路由不可达的不足,提出了一种基于策略DNS与HTTP Proxy在多宿主网络中服务的部署策略,在各ISP出口安装HTTP Proxy服务器,配合策略DN... 针对目前常用的多宿主网络服务部署方法中存在的由于ISP网络地址集的变化或DNS配置等因素会造成服务访问路由不可达的不足,提出了一种基于策略DNS与HTTP Proxy在多宿主网络中服务的部署策略,在各ISP出口安装HTTP Proxy服务器,配合策略DNS服务进行联合部署。从理论上对该策略进行了分析,并对部署方法进行了详细阐述。通过实例分析及效果测量,证实了在不改变网络拓扑、基本不增加投入的情况下,通过该策略可大幅度提高校园网或企业网信息资源服务的互联网用户访问速度和访问质量,并解决了传统方式中路由不可达的问题。 展开更多
关键词 策略 DNS HTTP proxy 多宿主网络
在线阅读 下载PDF
基于PROXY服务器的网络计费系统原理与实现 被引量:3
14
作者 谭跃生 王静宇 《内蒙古大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第2期221-223,共3页
网络计费是网络管理中重要的一部分 ,一个有效而合理的计费系统是校园网络正常运行的保证 .文章研究了代理机制 ,分析了基于 PROXY服务器的网络计费系统原理 ,提出了网络计费系统的一个开发模型 ,并对模型中的数据采集、计费信息处理、... 网络计费是网络管理中重要的一部分 ,一个有效而合理的计费系统是校园网络正常运行的保证 .文章研究了代理机制 ,分析了基于 PROXY服务器的网络计费系统原理 ,提出了网络计费系统的一个开发模型 ,并对模型中的数据采集、计费信息处理、数据查询等主要模块的设计作了较详细的阐述 . 展开更多
关键词 代理服务器 网络计费系统 日志文件 网络管理 代理机制 proxy服务器 校园网 工作原理
在线阅读 下载PDF
基于NAT-PT和PROXY的HTTP过渡方案的研究与改进 被引量:2
15
作者 杨怡 陶军 《计算机工程与应用》 CSCD 北大核心 2006年第4期149-151,共3页
NAT-PT技术和PROXY技术是HTTP服务从IPv4向IPv6过渡的两种主要技术,文章讨论了基于这两种技术的过渡方案的实现与改进。论文从原理上分析现有方案,提出现有实现方案存在的问题,如NAT-PT中的动态映射地址对过期而导致的访问出错的问题,以... NAT-PT技术和PROXY技术是HTTP服务从IPv4向IPv6过渡的两种主要技术,文章讨论了基于这两种技术的过渡方案的实现与改进。论文从原理上分析现有方案,提出现有实现方案存在的问题,如NAT-PT中的动态映射地址对过期而导致的访问出错的问题,以及PROXY方案中IPv4端不能通过IPv6地址直接访问的问题。针对上述问题提出了改进方案,并通过实验证明了改进方案的可行性和有效性。 展开更多
关键词 IPV6 过渡 NAT—PT proxy
在线阅读 下载PDF
基于Proxy服务器的计费系统 被引量:14
16
作者 鲍剑洋 王亚 《计算机应用》 CSCD 1999年第4期50-52,共3页
本文主要论述网络管理中计费系统的开发方法,探讨代理服务器的主要功能和工作流程,提出了基于Proxy服务器计费系统的系统结构和流程,最后给出了基于Proxy服务器计费系统的逻辑结构和系统功能。
关键词 网络管理 计费系统 proxy 服务器 计算机网络
在线阅读 下载PDF
采用SNMP Proxy技术的集群系统的单IP管理 被引量:1
17
作者 张俊 黄林鹏 《计算机工程》 EI CAS CSCD 北大核心 2005年第12期119-121,124,共4页
在互联网IP地址日益紧张的情况下,尽可能占用最少的IP地址对集群系统进行管理,将大大节约互联网IP地址资源。该文通过对比RFC1631和RFC2663中提出的NAT、NAPT技术实现原理,提出了SNMPPROXY技术,可以在不改造路由器的情况下,实现集群系... 在互联网IP地址日益紧张的情况下,尽可能占用最少的IP地址对集群系统进行管理,将大大节约互联网IP地址资源。该文通过对比RFC1631和RFC2663中提出的NAT、NAPT技术实现原理,提出了SNMPPROXY技术,可以在不改造路由器的情况下,实现集群系统的单IP地址SNMP管理。 展开更多
关键词 集群系统 路由器 NAT NAPT SNMP proxy
在线阅读 下载PDF
基于HTTP和Proxy防毒过滤网关的研究 被引量:1
18
作者 林碧英 王素琴 《计算机工程与应用》 CSCD 北大核心 2005年第25期155-158,共4页
随着Internet的飞速发展和广泛应用,大量的网络病毒已将Internet作为其一种主要的传播途径。网络病毒传播的方式很多,如通过访问网页、电子邮件以及FTP文件传输等等。为了使Web病毒(通过Web传播的网络病毒)的查杀工作对用户及Web服务器... 随着Internet的飞速发展和广泛应用,大量的网络病毒已将Internet作为其一种主要的传播途径。网络病毒传播的方式很多,如通过访问网页、电子邮件以及FTP文件传输等等。为了使Web病毒(通过Web传播的网络病毒)的查杀工作对用户及Web服务器透明化,同时降低Web服务器的风险,提高病毒查杀效率。我们采用了KPSG(KILLProxy Shield Gateway,代理过滤网关)的方式提供对Web病毒(如NIMDA)和蠕虫的查杀。 展开更多
关键词 KPSG Web病毒 proxy wgav 负载均衡
在线阅读 下载PDF
基于Full Proxy的NAT/Firewall的穿越 被引量:1
19
作者 章仁龙 罗宁 《计算机应用与软件》 CSCD 北大核心 2006年第7期101-103,123,共4页
VoIP语音视频流对NAT/F irewall的穿越已经成为语音数据业务开展过程中最大的障碍。Fu ll Proxy提供了一种NAT/F irewall穿越的有效途径,具有很强的适应性和透明性。深入讨论了Fu ll Proxy的实现原理和基于Fu ll Proxy的整个呼叫流程,... VoIP语音视频流对NAT/F irewall的穿越已经成为语音数据业务开展过程中最大的障碍。Fu ll Proxy提供了一种NAT/F irewall穿越的有效途径,具有很强的适应性和透明性。深入讨论了Fu ll Proxy的实现原理和基于Fu ll Proxy的整个呼叫流程,最后在一个嵌入式双CPU系统的基础上实现了一个Fu ll Proxy。 展开更多
关键词 Full proxy 嵌入式 NAT 防火墙 SIP
在线阅读 下载PDF
网格门户下基于GSI的MyProxy Login实现 被引量:3
20
作者 任开军 张卫民 +2 位作者 胡庆丰 赵西安 伍恒 《计算机工程与应用》 CSCD 北大核心 2004年第13期36-39,共4页
Globus项目通过网格安全基础设施GSI(GridSecurityInfrastructure)来提供网格计算环境中的安全认证和安全通信能力,该文通过基于GSI的安全技术分析和对Gridport下MyProxylogin实现原理的研究,并与普通登录方式进行比较,说明Gridportlogi... Globus项目通过网格安全基础设施GSI(GridSecurityInfrastructure)来提供网格计算环境中的安全认证和安全通信能力,该文通过基于GSI的安全技术分析和对Gridport下MyProxylogin实现原理的研究,并与普通登录方式进行比较,说明Gridportlogin利用MyProxy解决用户代理问题将更安全、高效。 展开更多
关键词 网格 GLOBUS GSI 代理
在线阅读 下载PDF
上一页 1 2 198 下一页 到第
使用帮助 返回顶部