Skip to main content
Log in

Function S-rough sets and security-authentication of hiding law

  • Published:
Science in China Series F: Information Sciences Aims and scope Submit manuscript

Abstract

Function S-rough sets are defined by R-function equivalence class, which have dynamic characteristic. Function S-rough sets have dynamic characteristic, law characteristic and law-hiding characteristic. Function S-rough sets can generate f-hiding law and \( \bar f \)-hiding law. By engrafting, crossing, and penetrating between the information security theory and function S-rough sets, the security hiding and the authentication of f-hiding law and \( \bar f \)-hiding law are given respectively in this paper. The fusion and share between function S-rough sets and information security theory is a new research direction of the application of information law in information system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shi K Q. S-rough sets and its applications in diagnosis-recognition for disease. IEEE Proc of the 1st Int Conf on Machine Learning and Cybernetics, 2002, 4(1): 50–54

    Google Scholar 

  2. Pawlak Z. Rough sets. Int J Comp Inf Sci, 1982, 32(11): 341–356

    Article  MathSciNet  Google Scholar 

  3. Shi K Q, Cui Y Q. F-decomposition and \( \bar F \)-reduction of S-rough sets. An Int J Adv Syst Sci Appl, 2004, 4(4): 487–499

    Google Scholar 

  4. Shi K Q, Chang T C. One direction S-rough sets. Int J Fuzzy Math, 2005, 13(2): 319–334

    MATH  MathSciNet  Google Scholar 

  5. Shi K Q. Two direction S-rough sets. Int J Fuzzy Math, 2005, 13(2): 335–349

    MATH  Google Scholar 

  6. Shi K Q. S-rough sets and discovery-recognition of new material. Syst Engin Elect (in Chinese), 2006, 28(3): 383–388

    Google Scholar 

  7. Shi K Q. Function S-rough sets and function transfer. An Int J Adv Syst Sci Appl, 2005, 5(1): 1–8

    Google Scholar 

  8. Shi K Q. Function S-rough sets. J Shandong Univ (Nat Sci) (in Chinese), 2005, 40(1): 1–10

    Google Scholar 

  9. Zhang P, Shi K Q. Function S-rough sets and rough law heredity-mining. IEEE Proc of the 4th Int Conf on Machine Learning and Cybernetics, 2005, 7(3): 3148–3152

    Article  Google Scholar 

  10. Cui Y Q, Shi K Q. Function S-rough sets and its applications. J Syst Engin Elect, 2006, 17(3): 434–442

    Google Scholar 

  11. Shi K Q, Yao B X. Function S-rough sets and recognition of financial risk laws. The 1st Int Conf on Rough Sets and Knowledge Technology, RSKT, 2006, 1(1): 247–253

    Article  MathSciNet  Google Scholar 

  12. Shi K Q. Function S-rough sets and mining-discovery of rough law in system. J Syst Engin Elect, 2006, 17(2): 330–338

    Google Scholar 

  13. Xue P J, Shi K Q. \( \bar F \)-generation law and recognition of system law. An Int J Adv Syst Sci Appl, 2006, 6(2): 177–183

    Google Scholar 

  14. Wang H Y, Shi K Q. Function S-rough sets and investment warning estimation. Int J Fuzzy Math, 2006, 14(3): 507–520

    Google Scholar 

  15. Shi K Q, Cui Y Q. S-rough Sets and Rough Decision (in Chinese). Beijing: Science Press, 2006. 155–165

    Google Scholar 

  16. Shi K Q, Yao B X. Function S-rough Sets and System Law Mining (in Chinese). Beijing: Science Press, 2007. 147–198

    Google Scholar 

  17. Koblitz N. Elliptic curve cryptosystems. Math Comp, 1987, 21(1): 203–209

    Article  MathSciNet  Google Scholar 

  18. Stallings W. Cryptography and Network Security Principles and Practice. London: Prentice-Hall Int Ltd, 1999. 193–206

    Google Scholar 

  19. Shi K Q, Cui Y Q Both-branch fuzzy decision and decision encryption-authentication, Sci China Ser F-Inf Sci, 2003, 46(2): 90–103

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to KaiQuan Shi.

Additional information

Supported by the National Natural Science Foundation of China (Grant No. 10771073) and the Natural Science Foundation of Shandong Province (Grant No. Y2004A04)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shi, K., Zhao, J. Function S-rough sets and security-authentication of hiding law. Sci. China Ser. F-Inf. Sci. 51, 924–935 (2008). https://doi.org/10.1007/s11432-008-0062-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-008-0062-9

Keywords

Navigation