Gendu Zhang

Learn More
Virtual community is becoming a significant component in today’s world of open, decentralized networks. Trust management mechanism is crucial to fertilize the development of the virtual community. After the analysis of the features of virtual community, and various approaches for trust management model, we present a novel trust management model for(More)
IP traceback is one of the most effective techniques to defeat the denial-of-service attacks and distributed denial-of-service attacks. And based on previous research, available probabilistic packet marking (PPM) schemes have more advantages than other IP traceback techniques. But the traditional schemes have too low marking packets utilization. In this(More)
Distributed denial-of-service attacks have become the major threat to Internet today. IP traceback is one of the most effective techniques to defeat these attacks by identifying attack sources even in the presence of IP spoofing. Because of low marking packet utilization, the convergence time of traditional probabilistic packet marking (PPM) schemes is(More)
In order to assess the security of network information system, many graph-based approaches have been proposed. Attack Graph is the most influential one. But attack graphs grow exponentially with the size of the network. In this paper, we propose an improved access graph based model to analyze network security. As a complement to the attack graph approach,(More)
The researches on the cryptographic protocols, especially on the formal analysis methods, have been paid much attention to in the last two decades. However, the formal methods already presented can not perfectly prove a protocol really secure. In this paper, we unfold the properties that cryptographic protocols should possess and then prove, with respect to(More)
Currently, the risk analysis for network Information system has experienced a stage from rule-based questionnaire investigation to model-based assessment. Many graph-based models have been proposed and applied to risk analysis. Attack Graph is widely used one. But attack graphs grow exponentially with the size of the network. In this paper, we propose a(More)