期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
SATVPC:Secure-agent-based trustworthy virtual private cloud model in open computing environments 被引量:2
1
作者 徐小龙 涂群 +2 位作者 BESSIS Nik 杨庚 王新珩 《Journal of Central South University》 SCIE EI CAS 2014年第8期3186-3196,共11页
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft... Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally. 展开更多
关键词 cloud computing trustworthy computing VIRTUALIZATION agent
在线阅读 下载PDF
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing 被引量:1
2
作者 Jie Zhu Guoyuan Lin +2 位作者 Fucheng You Huaqun Liu Chunru Zhou 《China Communications》 SCIE CSCD 2016年第7期83-91,共9页
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed... This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown. 展开更多
关键词 cloud computing virtual machine trustworthiness measurement dynamic trust transfer
在线阅读 下载PDF
Trustworthy Electromagnetic Computation for Non-penetrable Targets Using Integral Equations
3
作者 Jun Hu Haojie Cao +1 位作者 Xiong Yang Ran Zhao 《Electromagnetic Science》 2025年第4期23-35,共13页
With the increasing maturity of various computational electromagnetics algorithms,the field has evolved from traditional standalone electromagnetic simulations to a stage in which trustworthy electromagnetic computati... With the increasing maturity of various computational electromagnetics algorithms,the field has evolved from traditional standalone electromagnetic simulations to a stage in which trustworthy electromagnetic computation methods serve as the core,aimed at meeting the advanced demands of computer-aided engineering.Trustworthy electromagnetic computation consists of three key aspects:trustworthy model,trustworthy mesh,and trustworthy algorithm.This paper focuses on the aspect of trustworthy mesh,aiming to establish a systematic framework and methodology for achieving trustworthy computation under the assumption that the target geometry and associated parameters are determined.The framework starts with high-fidelity geometric meshing.An effective strategy is nonconformal domain decomposition,which facilitates accurate modeling of complex geometries and diverse materials.Subsequently,efficient preconditioning methods are utilized to ensure stable convergence when solving the resulting multiscale systems associated with high-fidelity meshes.After obtaining the numerical solution,verification procedures are applied to evaluate whether the desired accuracy has been achieved.If the solution fails to meet the specified precision,adaptive mesh refinement techniques are used to automatically redistribute mesh density.The objective is to attain greater accuracy with a minimal increase in degrees of freedom,thereby enhancing computational efficiency.The adaptive refinement process proceeds iteratively until the computed solution satisfies the established accuracy criteria.Within this framework,we propose a novel,fast,physics-based self-reference method,which leverages power conservation laws to assess the accuracy of the solution. 展开更多
关键词 Computer aided engineering trustworthy electromagnetic computation Integral equations
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部