The information security is a combination which includes the confidentiality, integrality and availability etc., but how to combine organically Keep it a problem. To take confidentiality and trust mechanism for exampl...
详细信息
The information security is a combination which includes the confidentiality, integrality and availability etc., but how to combine organically Keep it a problem. To take confidentiality and trust mechanism for example, it makes use of combination of confidentiality and the planar vector of the reputation grade at many instances. But the method can not reflect how much people concern confidentiality and reputation grade. Recently the author and the researchers put forward a solution for information confidentiality and integrity. In this paper, the combined function and new read-write rules of confidentiality and trust mechanism will be given and discussed. There are some good properties about the function, and its read-write rule is blp model and existing literature models through the analysis of this article.
暂无评论