ID 原文 译文
16275 在易感-感染-移除-易感(SIRS)病毒传播模型基础上,重新定义了感染状态节点,引入执行状态节点和毁损状态节点,建立了零日病毒传播的易感-初始感染-零日-毁损-移除(SIZDR)病毒传播动力学模型; Based on the Susceptible-Infected-Removed-Susceptible(SIRS) virus transmission model, the node of infection state is redefined, the node of execution state and the node of damage state are introduced, and the zero-day virus transmission Susceptible - Initial-state-of infection- Zero-day - Damaged Recovery (SIZDR) dynamic model is established.
16276 其次,运用劳斯稳定性判据,分析了系统平衡点的局部稳定性,基本再生数及其对病毒传播规模的影响。 Secondly, the local stability of the system equilibrium point, the basic regeneration number and itsinfluence on the scale of virus transmission are analyzed by using Rous stability criterion.
16277 最后,仿真验证了模型局部稳定性,分析了节点感染率、节点度和节点毁损率等因素对零日病毒传播的影响。 Finally, the localstability of the model is verified by simulation, and the influence of node infection rate, node degree and nodedamage rate on zero-day virus transmission is analyzed.
16278 理论分析与仿真结果表明,该模型能客观反映零日病毒传播规律,零日病毒扩散规模与节点度、节点感染率正相关,与节点毁损率负相关,对已知病毒的针对性防控可有效提升对零日病毒的防御效果。 Theoretical analysis and simulation results show that the proposed model can objectively reflect the law of zero-day virus transmission, and the magnitude of zero-day virus spread is positively correlated with node degree and node infection rate, and negatively correlated with node damage rate. Targeted prevention and control of known viruses can effectively improve the defense effect against zero-day viruses.
16279 在基于云计算的存储与删除服务中,由于外包数据所有权和管理分离,现有的逻辑删除机制使云上的数据很容易暴露给未经授权的用户,甚至云服务器可能未遵循用户要求删除相应数据。 In the storage and deletion service provided by cloud computing, due to the separation of outsourced data ownership and management, the cloud server may not follow the user’s request to delete the corresponding data, and the outsourced data can be easily exposed to unauthorized users due to the widely-adopted logical deletion.
16280 为此,该文提出一种细粒度的安全云端数据存储与删除方案。 Therefore, an efficient and secure cloud data storage and deletion scheme is proposed.
16281 基于椭圆曲线构造了基于密文策略的属性基加密以实现外包数据细粒度访问控制,应用区块链实现可公开验证的安全数据删除。 Firstly, an attribute-based encryption based on cipher text policy is constructed based on elliptic curves to achieve fine-grained access control. Secondly, publicly verifiable data deletion is realized by using blockchain.
16282 该文方案具有责任可追踪性以及两方删除与可验证性等特性。 The proposed scheme has the characteristics of responsibility traceability, two-party deletion and verifiability.
16283 理论分析与实验结果表明该文方案具有较好的安全性和较高的性能,能够满足云数据共享与安全删除的需求。 Theoretical analysis and experimental results show that the presented scheme has more desirable security and performance, and can meet the needs of cloud data sharing and secure deletion.
16284 针对云存储的集中化带来的数据安全和隐私保护问题,该文提出一种区块链上基于云辅助的密文策略属性基(CP-ABE)数据共享加密方案。 To solve the problem of data security and privacy preservation brought by the centralization of cloudstorage, a cloud-assisted Ciphertext Policy Attribute Based Eencryption(CP-ABE) data sharing encryptionscheme based on BlockChain(BC) is proposed.