Method for trust analysis of exchange process behavior based on noninterference

Aiming at the problem of dynamic data security exchange behavior cannot be controlled,methods for trusted analysis of exchange process behavior based on noninterference are proposed.First,the exchange behavior model is for-malized from the perspective of the exchange process.Then,the exchange behavi...

Full description

Saved in:
Bibliographic Details
Main Authors: Yi SUN, Xing-yuan CHEN, Xue-hui DU, Cheng LEI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2014-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.12.017/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539729209688064
author Yi SUN
Xing-yuan CHEN
Xue-hui DU
Cheng LEI
author_facet Yi SUN
Xing-yuan CHEN
Xue-hui DU
Cheng LEI
author_sort Yi SUN
collection DOAJ
description Aiming at the problem of dynamic data security exchange behavior cannot be controlled,methods for trusted analysis of exchange process behavior based on noninterference are proposed.First,the exchange behavior model is for-malized from the perspective of the exchange process.Then,the exchange behavior trust constraint rules,exchange be-havior trust judgment theorem and security proof are given in different stages and different mode.Finally,a concrete ap-plication example shows the availability of the method.
format Article
id doaj-art-540c0025a827401f978454c8d10ebd33
institution Kabale University
issn 1000-436X
language zho
publishDate 2014-12-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-540c0025a827401f978454c8d10ebd332025-01-14T06:44:38ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-12-013514415259687614Method for trust analysis of exchange process behavior based on noninterferenceYi SUNXing-yuan CHENXue-hui DUCheng LEIAiming at the problem of dynamic data security exchange behavior cannot be controlled,methods for trusted analysis of exchange process behavior based on noninterference are proposed.First,the exchange behavior model is for-malized from the perspective of the exchange process.Then,the exchange behavior trust constraint rules,exchange be-havior trust judgment theorem and security proof are given in different stages and different mode.Finally,a concrete ap-plication example shows the availability of the method.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.12.017/noninterference policycontrolled exchangeprocess behaviortrust
spellingShingle Yi SUN
Xing-yuan CHEN
Xue-hui DU
Cheng LEI
Method for trust analysis of exchange process behavior based on noninterference
Tongxin xuebao
noninterference policy
controlled exchange
process behavior
trust
title Method for trust analysis of exchange process behavior based on noninterference
title_full Method for trust analysis of exchange process behavior based on noninterference
title_fullStr Method for trust analysis of exchange process behavior based on noninterference
title_full_unstemmed Method for trust analysis of exchange process behavior based on noninterference
title_short Method for trust analysis of exchange process behavior based on noninterference
title_sort method for trust analysis of exchange process behavior based on noninterference
topic noninterference policy
controlled exchange
process behavior
trust
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.12.017/
work_keys_str_mv AT yisun methodfortrustanalysisofexchangeprocessbehaviorbasedonnoninterference
AT xingyuanchen methodfortrustanalysisofexchangeprocessbehaviorbasedonnoninterference
AT xuehuidu methodfortrustanalysisofexchangeprocessbehaviorbasedonnoninterference
AT chenglei methodfortrustanalysisofexchangeprocessbehaviorbasedonnoninterference