Grid Services Trusted Authentication Algorithm Based on Image Trusted Root in Scale Space

来源 :第六届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:wing001019
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root is made as an image data.The grid entity is trusted in the soft platform when its feature of image root is entirely matched with that from the other entities feature database in a scale space process.To recognize and detect the stable image root feature,the non-homogeneous linear expandable scale space is proposed.Focusing on relations between the scale parameter of the inhomogeneous Gaussian function terms and the space evolution of thermal diffusion homogeneous equations,three space evolution operators are constructed to exact and mark the feature from image root.Analysis and verification are carried on the new scale space,operators and the core of making decisions for grid entities certifications.
其他文献
In 2010,Lee et al proposed two simple and efficient three-party password-authenticated key exchange protocols that had been proven secure in the random oracle model.They argued that the two protocols
In this paper,we present the generalized Huff curves that contain Huffs model as a special case.First,it is proved that every elliptic curve with three points of order 2 is isomorphic to a generalized
This paper contributes to the stability of linear complexity of a binary periodic Jaeobi sequence.By employing a pair of reference sequences,we prove that the linear complexity of a binary Jacobi sequ
This article proposes an enhanced differential fault analysis (DFA) method named as fault-propagation pattern-based DFA (FPP-DFA).The main idea of FPP-DFA is using the FPP of the ciphertext difference
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure enough.This article extends model checking method wit
Security testing is a key technology for software security.The testing results can reflect the relationship between Software testing and software security,and they can help program designers for evalu
It is difficult for security experts to generate polymorphic signatures by using traditional string mining and matching techniques.A semantic-aware method is presented to generate a kind of two-level
Nowadays,the capability of traditional digital forensic tools fails to meet the demand of ever increasing of criminal or civil cases.One of the challenges is that digital devices and applications are
A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible w
Localization is one of the key technologies in wireless sensor networks,and the existing PSO-based localization methods are based on standard PSO,which cannot guarantee the global convergence.For the