Method for trust analysis of exchange process behavior based on noninterference
Aiming at the problem of dynamic data security exchange behavior cannot be controlled,methods for trusted analysis of exchange process behavior based on noninterference are proposed.First,the exchange behavior model is for-malized from the perspective of the exchange process.Then,the exchange behavi...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-12-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.12.017/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539729209688064 |
---|---|
author | Yi SUN Xing-yuan CHEN Xue-hui DU Cheng LEI |
author_facet | Yi SUN Xing-yuan CHEN Xue-hui DU Cheng LEI |
author_sort | Yi SUN |
collection | DOAJ |
description | Aiming at the problem of dynamic data security exchange behavior cannot be controlled,methods for trusted analysis of exchange process behavior based on noninterference are proposed.First,the exchange behavior model is for-malized from the perspective of the exchange process.Then,the exchange behavior trust constraint rules,exchange be-havior trust judgment theorem and security proof are given in different stages and different mode.Finally,a concrete ap-plication example shows the availability of the method. |
format | Article |
id | doaj-art-540c0025a827401f978454c8d10ebd33 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2014-12-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-540c0025a827401f978454c8d10ebd332025-01-14T06:44:38ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-12-013514415259687614Method for trust analysis of exchange process behavior based on noninterferenceYi SUNXing-yuan CHENXue-hui DUCheng LEIAiming at the problem of dynamic data security exchange behavior cannot be controlled,methods for trusted analysis of exchange process behavior based on noninterference are proposed.First,the exchange behavior model is for-malized from the perspective of the exchange process.Then,the exchange behavior trust constraint rules,exchange be-havior trust judgment theorem and security proof are given in different stages and different mode.Finally,a concrete ap-plication example shows the availability of the method.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.12.017/noninterference policycontrolled exchangeprocess behaviortrust |
spellingShingle | Yi SUN Xing-yuan CHEN Xue-hui DU Cheng LEI Method for trust analysis of exchange process behavior based on noninterference Tongxin xuebao noninterference policy controlled exchange process behavior trust |
title | Method for trust analysis of exchange process behavior based on noninterference |
title_full | Method for trust analysis of exchange process behavior based on noninterference |
title_fullStr | Method for trust analysis of exchange process behavior based on noninterference |
title_full_unstemmed | Method for trust analysis of exchange process behavior based on noninterference |
title_short | Method for trust analysis of exchange process behavior based on noninterference |
title_sort | method for trust analysis of exchange process behavior based on noninterference |
topic | noninterference policy controlled exchange process behavior trust |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.12.017/ |
work_keys_str_mv | AT yisun methodfortrustanalysisofexchangeprocessbehaviorbasedonnoninterference AT xingyuanchen methodfortrustanalysisofexchangeprocessbehaviorbasedonnoninterference AT xuehuidu methodfortrustanalysisofexchangeprocessbehaviorbasedonnoninterference AT chenglei methodfortrustanalysisofexchangeprocessbehaviorbasedonnoninterference |