Learn More
With the rapid development of cloud computing, more and more users begin to share documents in cloud servers. Since cloud servers are not within the trusted domain of users, encryption and access control are needed to protect the digital content. Attribute-based encryption is a favorable scheme that has been used for content protection in cloud computing.(More)
We investigated the expression status of periostin in breast cancer stem cells and its clinical implications in order to lay a foundation for managing breast cancer. CD44+/CD24-/line- tumor cells (CSC) from clinical specimens were sorted using flow cytometry. Periostin expression status was detected in CSC cells and 1,086 breast cancer specimens by Western(More)
Hierarchical cryptographic key management of access control can be modeled as a partially ordered set in which a high security class can derive its descendant encryption keys, but not vice versa. In this paper, we propose a practical key management scheme for our segment-based document which is a novel XML-based document format for web publishing, called(More)
—The optimal widely linear (WL) minimum variance distortionless response (MVDR) beamformer, which has a powerful performance for the reception of a noncircular signal, was proposed by Chevalier et al. in 2009. Nevertheless, in spectrum monitoring or passive listening, the optimal WL MVDR beam-former is hard to implement due to an unknown second-order (SO)(More)
This paper presents a new direction-of-arrival (DOA) estimation method using the concept of sparse representation of an array cross-correlation vector (ACCV), in which DOA estimation is achieved by finding the sparse parameter vector according to an optimization criterion. Compared with other sparse recovery algorithms the proposed method achieves a higher(More)
With the increasing complexity and diversity of information systems, more and more researchers gradually pay attention to the real-time dynamic risk assessment. In this paper, we introduce a method for information security risk assessment based on the dynamic Bayesian network. Firstly, we create a dynamic Bayesian network model based on the risk assessment(More)