2014
DOI: 10.4028/www.scientific.net/amm.513-517.1109
View full text
|
|
Share

Abstract: Network computing system exists security issue, so we proposed a calculation method which could distinguish credible level from information mining. The calculation method uses system credible state detector to detect network system entities behaviors which in different environments and the different angles, extraction behaviors that affect credible decision-making as evidence. Normalized the systematic evidence, then the information of data mining based on cloud model and calculation credible identification. F…

expand abstract