Jing Liu

Work place: School of Computer & Communication Engineering, China University of Petroleum, Dong Ying, China

E-mail: liujing415jsj@163.com

Website:

Research Interests: Parallel Computing

Biography

Jing Liu holds a bachelor degree in computer science and technology from Inner Mongolia Finace and Economics College in 2009.
She is getting a master degree of computer science and technology in China University of Petroleum now. Her research direction is the access control of service-oriented computing in Internet of Things.

Author Articles
The Study of Access Control for Service-Oriented Computing in Internet of Things

By Guoping Zhang Jing Liu

DOI: https://doi.org/10.5815/ijwmt.2012.03.10, Pub. Date: 15 Jun. 2012

In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC), and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

[...] Read more.
Capsaicin-induced Thermal Enhancement on Target Tissues in Hyperthermia

By Peng Zeng Zhong-Shan Deng Jing Liu

DOI: https://doi.org/10.5815/ijigsp.2011.03.07, Pub. Date: 8 Apr. 2011

Local thermal enhancement in target tissue is of great interest in tumor hyperthermia. In this study, we proposed a brand-new thermal enhancement protocol for tumor hyperthermia using heat generated from thermoge-nesis evoked by capsaicin, which can safely deliver a totally localized heating to target tissue. A healthy male volunteer was recruited, whose partial areas of the dorsum of hand and posterior aspect of forearm were smeared with 1% (w/w) capsaicin solution, to determine the increase of ther-mogenesis in human body. In addition, animal experiments on healthy Kunming (KM) mice (20-22g) were performed to test the feasibility and efficacy of capsaicin-induced thermal enhancement. These KM mice were first locally smeared with, subcutaneous or intraperitoneal injected of the same capsaicin solution, and then heated by near infrared laser. Preliminary experiments on the volunteer showed an effec-tive temperature increase in the skin area. Animal experi-ments indicated that distinct thermal enhancement in heat-ing effect, and that the thermal enhancement induced by intraperitoneal injection of capsaicin is more obvious than the other two ways. Thus capsaicin can be used as a poten-tial therapeutic adjuvant to locally enhance heating effects in target tissue during tumor hyperthermia.

[...] Read more.
A Model of Workflow-oriented Attributed Based Access Control

By Guoping Zhang Jing Liu

DOI: https://doi.org/10.5815/ijcnis.2011.01.07, Pub. Date: 8 Feb. 2011

The emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC), and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

[...] Read more.
Other Articles