CN102495978A - 开放计算环境下任务执行体与执行点可信指数计算方法 - Google Patents
开放计算环境下任务执行体与执行点可信指数计算方法 Download PDFInfo
- Publication number
- CN102495978A CN102495978A CN2011103514535A CN201110351453A CN102495978A CN 102495978 A CN102495978 A CN 102495978A CN 2011103514535 A CN2011103514535 A CN 2011103514535A CN 201110351453 A CN201110351453 A CN 201110351453A CN 102495978 A CN102495978 A CN 102495978A
- Authority
- CN
- China
- Prior art keywords
- task
- carried out
- point
- code
- confidence level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004364 calculation method Methods 0.000 title claims abstract description 28
- 238000005259 measurement Methods 0.000 claims description 5
- 238000012550 audit Methods 0.000 claims description 4
- 238000000034 method Methods 0.000 abstract description 8
- 230000006378 damage Effects 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000005012 migration Effects 0.000 description 2
- 238000013508 migration Methods 0.000 description 2
- 244000035744 Hura crepitans Species 0.000 description 1
- 206010033799 Paralysis Diseases 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
执行体代码行为 | 恶意程度 |
正常代码,无任何恶意行为 | 0 |
代码对资源使用轻微过量,但对节点运行和其它任务基本没有影响 | 0.1 |
代码对资源使用过度,且对节点运行和其它任务产生影响 | 0.3 |
代码使节点产生类似于拒绝服务的效果 | 0.5 |
代码试图窥探其它执行体的数据和执行逻辑 | 0.7 |
代码试图攻击其它执行体,篡改执行逻辑和执行结果 | 0.9 |
代码试图攻击整个计算环境,使整个系统大规模瘫痪并造成重大损失 | 1.0 |
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110351453.5A CN102495978B (zh) | 2011-11-09 | 2011-11-09 | 开放计算环境下任务执行体与执行点可信指数计算方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110351453.5A CN102495978B (zh) | 2011-11-09 | 2011-11-09 | 开放计算环境下任务执行体与执行点可信指数计算方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102495978A true CN102495978A (zh) | 2012-06-13 |
CN102495978B CN102495978B (zh) | 2015-03-04 |
Family
ID=46187803
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110351453.5A Active CN102495978B (zh) | 2011-11-09 | 2011-11-09 | 开放计算环境下任务执行体与执行点可信指数计算方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102495978B (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111382430A (zh) * | 2018-12-28 | 2020-07-07 | 卡巴斯基实验室股份制公司 | 用于对计算机系统的对象进行分类的系统和方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101039178A (zh) * | 2007-04-18 | 2007-09-19 | 华中师范大学 | 一种开放系统中层次信任模型的建立方法 |
CN101442562A (zh) * | 2008-12-12 | 2009-05-27 | 南京邮电大学 | 基于移动代理的上下文感知方法 |
CN101692676A (zh) * | 2009-09-29 | 2010-04-07 | 华中师范大学 | 一种开放环境下的混合信任管理系统及其信任评估方法 |
CN101715001A (zh) * | 2009-10-21 | 2010-05-26 | 南京邮电大学 | 一种控制网格任务执行的方法 |
-
2011
- 2011-11-09 CN CN201110351453.5A patent/CN102495978B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101039178A (zh) * | 2007-04-18 | 2007-09-19 | 华中师范大学 | 一种开放系统中层次信任模型的建立方法 |
CN101442562A (zh) * | 2008-12-12 | 2009-05-27 | 南京邮电大学 | 基于移动代理的上下文感知方法 |
CN101692676A (zh) * | 2009-09-29 | 2010-04-07 | 华中师范大学 | 一种开放环境下的混合信任管理系统及其信任评估方法 |
CN101715001A (zh) * | 2009-10-21 | 2010-05-26 | 南京邮电大学 | 一种控制网格任务执行的方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111382430A (zh) * | 2018-12-28 | 2020-07-07 | 卡巴斯基实验室股份制公司 | 用于对计算机系统的对象进行分类的系统和方法 |
Also Published As
Publication number | Publication date |
---|---|
CN102495978B (zh) | 2015-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Durrani et al. | Volunteer computing: requirements, challenges, and solutions | |
Li et al. | A neural network based distributed intrusion detection system on cloud platform | |
Che et al. | A lightweight trust management based on Bayesian and Entropy for wireless sensor networks | |
Wüst et al. | Ace: Asynchronous and concurrent execution of complex smart contracts | |
Rawat et al. | iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity | |
Perez et al. | Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions | |
CN108924086A (zh) | 一种基于安全代理的主机信息采集方法 | |
CN102752279B (zh) | 一种社交网络恶意代码传播的仿真系统及仿真方法 | |
CN101795281A (zh) | 一种适合可信连接架构的平台鉴别实现方法及系统 | |
Levitin et al. | Co-residence data theft attacks on N-Version programming-based cloud services with task cancelation | |
Li et al. | A survey of state-of-the-art sharding blockchains: Models, components, and attack surfaces | |
Arifeen et al. | Autoencoder based consensus mechanism for blockchain-enabled industrial internet of things | |
CN102495978A (zh) | 开放计算环境下任务执行体与执行点可信指数计算方法 | |
Hosseini | Defense against malware propagation in complex heterogeneous networks | |
Bendahmane et al. | Result verification mechanism for MapReduce computation integrity in cloud computing | |
Meriah et al. | A survey of quantitative security risk analysis models for computer systems | |
Jia et al. | Association analysis of private information in distributed social networks based on big data | |
Felemban et al. | Threat management in data-centric IoT-based collaborative systems | |
La Salle et al. | Joint modeling of hyperledger fabric and sybil attack: petri net approach | |
Haghighat et al. | Service integrity assurance for distributed computation outsourcing | |
Zhu et al. | MPPM: Malware propagation and prevention model in online SNS | |
Lazreg et al. | Cloudlet-cloud network communication based on blockchain technology | |
KR20220072939A (ko) | 시계열 학습형 앙상블 인공지능 기법을 이용한 사회이슈 기반 사이버 표적공격 예측 시스템 및 그 예측 방법 | |
Ali et al. | SRP: An Efficient Runtime Protection Framework for Blockchain-based Smart Contracts | |
Neelakantan | A secure framework for the cloud to protect the virtual machine from malicious events |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: NANJING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS Free format text: FORMER OWNER: NANJING POST + TELECOMMUNICATION UNIV. Effective date: 20150814 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20150814 Address after: 210003 Nanjing City, Jiangsu Province, the new model road No. 66 Patentee after: Nanjing University of Posts and Telecommunications Asset Management Co.,Ltd. Address before: Yuen Road Qixia District of Nanjing City, Jiangsu Province, No. 9 210046 Patentee before: NANJING University OF POSTS AND TELECOMMUNICATIONS |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20151109 Address after: 224005, Jiangsu, Yancheng City New South District, Xindu street, wisdom Valley Science and technology innovation building, South 15 Patentee after: NUPT INSTITUTE OF BIG DATA RESEARCH AT YANCHENG Address before: 210003 Nanjing City, Jiangsu Province, the new model road No. 66 Patentee before: Nanjing University of Posts and Telecommunications Asset Management Co.,Ltd. |
|
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20120613 Assignee: Yanmi Technology (Yancheng) Co.,Ltd. Assignor: NUPT INSTITUTE OF BIG DATA RESEARCH AT YANCHENG Contract record no.: X2023980047098 Denomination of invention: A method for calculating the trustworthiness index of task execution bodies and execution points in open computing environments Granted publication date: 20150304 License type: Common License Record date: 20231115 |
|
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20120613 Assignee: Jiangsu Yanan Information Technology Co.,Ltd. Assignor: NUPT INSTITUTE OF BIG DATA RESEARCH AT YANCHENG Contract record no.: X2023980049133 Denomination of invention: A method for calculating the trustworthiness index of task execution bodies and execution points in open computing environments Granted publication date: 20150304 License type: Common License Record date: 20231203 Application publication date: 20120613 Assignee: Yancheng Nongfu Technology Co.,Ltd. Assignor: NUPT INSTITUTE OF BIG DATA RESEARCH AT YANCHENG Contract record no.: X2023980049126 Denomination of invention: A method for calculating the trustworthiness index of task execution bodies and execution points in open computing environments Granted publication date: 20150304 License type: Common License Record date: 20231203 |
|
EE01 | Entry into force of recordation of patent licensing contract |