DocumentCode :
3027092
Title :
Trust analysis method of process behavior for data security exchange
Author :
Yi Sun ; Xingyuan Chen ; Xuehui Du
Author_Institution :
Sch. of Comput.&Inf. Technol., Beijing Jiaotong Univ., Zhengzhou, China
fYear :
2013
fDate :
20-22 Dec. 2013
Firstpage :
2162
Lastpage :
2167
Abstract :
Aiming at the problem of dynamic data security exchange behavior cannot be controlled, we put forward methods for trusted analysis of exchange process behavior based on noninterference. First, the exchange behavior modeling is formalized from the perspective of the exchange process. Then the exchange behavior trust constraint rules are given in different stages and different mode. Finally, exchange behavior trust judgment theorem are given and proved based on noninterference. The method can provide theoretical basis for the behavior analysis of data security exchange system.
Keywords :
cloud computing; electronic data interchange; security of data; trusted computing; dynamic data security exchange behavior; exchange behavior modeling; exchange behavior trust constraint rules; exchange behavior trust judgment theorem; exchange process behavior trust analysis method; noninterference policy; Data security; Equations; Information science; Interference; Process control; Trajectory; Controlled exchange; Noninterference policy; Process behavior; Trust;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mechatronic Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference on
Conference_Location :
Shengyang
Print_ISBN :
978-1-4799-2564-3
Type :
conf
DOI :
10.1109/MEC.2013.6885406
Filename :
6885406
Link To Document :
بازگشت