Grid Services Trusted Authentication Algorithm Based on Image Trusted Root in Scale Space

来源 :第六届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:yangxiaoxi21
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root is made as an image data.The grid entity is trusted in the soft platform when its feature of image root is entirely matched with that from the other entities feature database in a scale space process.To recognize and detect the stable image root feature,the non-homogeneous linear expandable scale space is proposed.Focusing on relations between the scale parameter of the inhomogeneous Gaussian function terms and the space evolution of thermal diffusion homogeneous equations,three space evolution operators are constructed to exact and mark the feature from image root.Analysis and verification are carried on the new scale space,operators and the core of making decisions for grid entities certifications.
其他文献
燃煤电站是引起我国大气环境中PM2.5含量增加的主要原因之一;鉴于燃煤电站大多现有污染物控制设施本身具有脱除颗粒物的功效,只因PM2.5粒径小,捕集效果不佳;因此,对现有污染物
利用上海地区的4个大气成分综合观测站的PM2.5观测数据和气象数据,我们对2012年夏季(7月-8月)大气污染物PM2.5进行在线观测和分析.结果表明,(1)以区域划分来看,上海不同区域
  Localization is one of the key technologies in wireless sensor networks,and the existing PSO-based localization methods are based on standard PSO,which cann
会议
对河北省不同人群戊型肝炎病毒(HEV)感染状况和急、慢性肝炎中HE的比例进行了调查。用美国Gen-labsELISA试剂检测抗-HEV和抗-HEVIgM。经多阶段整群系统随机抽样,调查了6个疾病监测点中的3208名1~59岁常住居民,抗-HEV总标化阳
沙子乡全民化疗全民休根和灭蚊的抗疟效果贵州省晴隆县卫生防疫站晴隆561400龙昌国,王龙生沙子乡共有11617人,流行间日疟,未采取全民眼药前的1984—1985年和拉以吉普施的1986年疟疾发病人数分别为86、49和52例
总经理张建国对记者说:“有人曾断言,邢台的公交走不出困境,而邢台公交可以说:‘不’!”记者听后不觉一振。邢台公交人的的确确创下了这样一个奇迹:从一个背负沉重负担、步履
  For the issue of the discretionary access control (DAC) model safety analysis,a logic method is proposed.This method takes the GD model as the classic DAC m
会议
依托三级网全面推动计免工作郑树槐,刘喜(河北省唐山市卫生局063000)我市的计划免疫工作,在广大卫生防疫人员的辛勤努力下,以农村三级预防保健网为依托,坚持"预防为主"的方针,经过多年的实践
人生在世,走过的路有千万条。每个人都有每个人的脚印,或深或浅,或直或弯,或明或暗……当刘晓伟在漫漫人生路上跋涉过47个年头,蓦然回首时,身后印着一串坚实的足迹,让她聊以
  End hopping is one of the good methods to defend against network attack,but has problems with network address translation (NAT) because packets sent from an
会议