期刊文献+

面向属性计算的转义性计算研究

Quantifying security based on semantic transfer for property computing
在线阅读 下载PDF
导出
摘要 针对属性计算框架可客观地计算安全的度,但某些属性难以计算的问题。提出了转义性概念,研究公平性与无干扰之间的语义关系。仿真表明,采用转义方式计算安全度的合理性,这为属性计算框架从理论走向应用提供了一种方法。 The framework of property computing can be adopted to efficiently and objectively compute the degree of security,however,some properties are not easy to be computed.Addressing the problem,a corresponding method called semantic-transfer is proposed.As a case,the semantic-transfer relation between fairness and non-interference is studied,and a novel method of quantifying fairness is presented.The simulation result shows the method is reasonable.The work can promote property computing from theory to practice.
出处 《桂林电子科技大学学报》 2011年第6期431-433,共3页 Journal of Guilin University of Electronic Technology
基金 国家自然科学基金(61100186)
关键词 属性计算 公平性 无干扰 转义性 property computing fairness non-interference semantic transfer
  • 相关文献

参考文献11

  • 1茼大鹏.网络系统安全性评估技术研究[D].哈尔滨:哈尔滨工业大学,2009.
  • 2方滨兴,殷丽华.关于信息安全定义的研究[J].信息网络安全,2008(1):8-10. 被引量:23
  • 3MARKOWITCH O, ROGGEMAN Y. Probabilistic non-repudiation without trusted third party[C]//IEEE Conirerence on Security in Communication Networks[S. 1. ] : [s. n. ], 1999 z 12-24.
  • 4ALDINI A, DI PIERRO A. On quantitative analysis of probabi- listic protocols[C]//Workshop on Quantitative Aspects of Programming Languages(LNCS)[S. 1. ] :[s. n. ],2005 : 131-148.
  • 5Sun Donghong, Guo Yunchuan, Yin Lihu, et al. Comparison of measuring information leakage for fully probabilistic systems [J]. International Journal of Innovative Computing Information and Control, 2012,8(1) :255-268.
  • 6ISERN-DEYA A P, PAYERAS-CAPELLA M M, MUT-PUIG- SERVEr M, et al. Anonymous, secure and fair protocol to access location-based services subject to paymem[C]// Proceedings d the International Corfference on Advances in Mobile Computing and Multimedm. [S. 1. ][s. n. ], 2010: 436-441.
  • 7ZHOU J, GOLLMAN D. A fair non-repudiation protocol[C]// IEEE Symposium on Security and Privacy. FS. 1.]: [s. n.], 1996:55-61.
  • 8AUSTIN T H, FLANAGAN C. Permissive dynamic informa- tion flow analysis[C]//Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and AnaLysis for Securi- ty. [S.l.]:[s.n.], 2010:1-12.
  • 9ALDINI A, BRAVETTI M. Classification of security properties in a linda-like process algebra[J]. Journal of Science of Comput- er Programming, Special Issue on Security Issues in Coordina tion Models, Languages and Systems, 2006,63(1):16-38.
  • 10FOURNET C, PLANUL J. Compiling information-flow secu- rity to minimal trusted computing bases[J]. Programming Languages and Systems, Lecture Notes in Computer Science, 2011,6602 : 216-235.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部