Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Li Yahui is active.

Publication


Featured researches published by Li Yahui.


computational intelligence and security | 2011

AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework

Cheng Yameng; Shen Yulong; Ma Jianfeng; Cui Xining; Li Yahui

MILS (Multiple Independent Levels of Security and Safety) is a high-assurance architecture for secure sharing of different security-level information. But the MILS security evaluation is facing a great challenge. Traditional Common Criteria (CC) method is not suitable for MILS system evaluation for its complexity, time consuming and qualitative description. To achieve quantitative security assessment, we proposes an AHP-GRAP based security evaluation model for MILS system within CC framework. AHP (Analytic Hierarchy Process) is used to obtain the weight of each component with respect to the final goal of the security evaluation. GRAP (Grey Relational Analytic Process) is adapted to analyze evaluation data to implement a quantitative integration evaluation. The new method overcomes the disadvantage of CC and realizes the quantitative description for MILS system security evaluation. The proposed method is used to evaluate the MILS system and the result shows that its security is Level 4.


computational intelligence and security | 2012

Security Information Flow Control Model and Method in MILS

Zhou Yinping; Shen Yulong; Pei Qingqi; Cui Xining; Li Yahui

Multiple Independent Levels of Security (MILS) is a high-assurance architecture which protects information sharing at different security levels. MILS ensures mutual independence and prevents the spread of the error effectively between partitions. However, in some specific applications, there exists enormous amount of information interaction and sharing between partitions, the process of which has the problem of potential sensitive information leakage and tamper. From the point of view of information flow control, the article puts forward a model and method of security information flow control strictly between MILS partitions based on trusted computing. At first, we designed a lattice-based multi-level policy and a downgrading policy. The two policies not only automatically make the indirect information flow secure, but also break the traditional BLP model curt rules not read up, not write down, which meet the needs of the security level of subjects and objects with the changes of task requirements in MILS. On this basis, a complete information flow control mechanism is established. By detailed analysis and verification, our information security flow security control method can effectively ensure that the information flow between partitions are all legitimate news after authorized by Separation Kernel and filtered by credible components, which can efficaciously protect the confidentiality and integrity of sensitive information.


Archive | 2015

Transfer method from demand model to simulation model

Guo Peng; Li Yahui; Niu Wensheng; Zhang Yadi; Ye Hong


Archive | 2017

Automatic explosion starting quicksand fire extinguishing device

Zhang Jianwei; Zhang Zhenping; Yang Chao; Lyu Zhanwei; Xia Mingxian; Li Yahui; Zhang Zhiwei


Archive | 2017

To one side straight dual -purpose rat hole pipe

Guo Xiaoyan; Huang Zhihu; Zhang Hushan; Li Yahui; Yang Gang


Archive | 2017

Seat is pull to twin -lock formula

Guo Qiankun; Huang Zhihu; Chen Cheng; Hu Nan; Li Yahui


Archive | 2017

Mud measurement system

Zhang Hushan; Zhang Zhiwei; Li Yahui; Wu Weizhou; Guo Xiaoyan


Archive | 2017

Task scheduling method for airborne trusted computing platform

Ma Jianfeng; Wu Qixuan; Li Yahui; Sun Cong; Niu Wensheng; Sun Zhaochang; Bai Linting; Paerhatijiang Sidike


Weidianzixue yu Jisuanji | 2016

領域Ye級マッピングのフラッシュ変換層設計に基づく【JST・京大機械翻訳】

Cai Xiaole; Zhang Yadi; Li Yahui; Hai Yulin


Archive | 2016

Real time video defogging method

Cheng Yue; Wen Pengcheng; Li Yahui; Zhang Donghong; Wang Haipeng; Bai Linting

Collaboration


Dive into the Li Yahui's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wang Ning

Jinggangshan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge