Zhenpeng Liu

Learn More
Multi authority attribute based encryption solve a completely trust problem about a single authorization center, make the data owner control fine-grained data and resist collusion attack. But in the practical attribute revocation needs a lot of calculation. Adding the user revocation list into cipher text implements the user revocation. Through agent(More)
In this paper, an IPOMS (Internet Public Opinion Monitoring System) is proposed. This system can collect web pages with some certain key words from Internet news, topics on forum and BBS, and then cluster these web pages according to different ‘event’ groups. Furthermore, this system provides the function of automatically tracking the progress(More)
At present, e-commerce and e-services system can provide trust information about services provider performance to the customers in the near future. Such information is an accumulation value by long-term evaluation of quality of service, but it does not reflect the Service's future trends. This paper presents an approach using a cubic fitting curve to(More)
The simple trust evaluation methods that result in a final trust level (FTL) value can't be able to evaluate service trust trend (STT). Furthermore, statistical trust values include some unfair and questionable trust values caused by subjective or objective factors. In response to these problems in trust management, an approach called two-way trust(More)
—Trust is a critical issue in e-commerce and e-service applications. Usually, the value of trust is in a dynamic process of change. At present, most of studies and applications regarding trust are focus on methods that result in a single final trust level (FTL) value to represent the trust level of sellers or service providers. Such simple trust evaluation(More)
For peer-to-peer networks, searching is the basic function absolutely necessarily. But it is also a difficult problem with many challenges. In this paper, we bring forward a semantics-based P2P searching algorithm. It can make searching massage expressively. This algorithm advances the idea of super peer to obtain load balance. For the purpose of improving(More)
The traditional K-means algorithm is sensitive to the initial center, and equates the importance of dimension data for multidimensional data. So it is unable to block the effects of dimensional data dimension, nor can it well reflect the influence of each dimension of clustering. The semi-supervised clustering introduces a small amount of sample points, so(More)
Traditional Internet public opinion hotspot tracking method is based on Text clustering, its text clustering speed and search result is not so good when handling massive webpage. The monitoring scale of Internet public opinion system is limited in the listed key words by the users, so that system cannot monitor the unknown emergency. According to the(More)
—To deal with the problems such as Web Services selection algorithm, availability of Web Services composition and QoS(Quality of Service) guarantee, presents a model for Web Services composition based on QoS and providers' benefit. In this model, the traditional UDDI is expanded to describe the QoS attributes of Web Services. A Service Proxy role is added(More)
An authentication system based on trusted platform is presented in distributed network, network nodes are distributed in each domain, the domain authentication server based-TPM granted a certificate to each trusted member of domain and authorize trust token to access network source in different domain, in this paper, many security technologies are applied,(More)