Title :
Trust analysis method of process behavior for data security exchange
Author :
Yi Sun ; Xingyuan Chen ; Xuehui Du
Author_Institution :
Sch. of Comput.&Inf. Technol., Beijing Jiaotong Univ., Zhengzhou, China
Abstract :
Aiming at the problem of dynamic data security exchange behavior cannot be controlled, we put forward methods for trusted analysis of exchange process behavior based on noninterference. First, the exchange behavior modeling is formalized from the perspective of the exchange process. Then the exchange behavior trust constraint rules are given in different stages and different mode. Finally, exchange behavior trust judgment theorem are given and proved based on noninterference. The method can provide theoretical basis for the behavior analysis of data security exchange system.
Keywords :
cloud computing; electronic data interchange; security of data; trusted computing; dynamic data security exchange behavior; exchange behavior modeling; exchange behavior trust constraint rules; exchange behavior trust judgment theorem; exchange process behavior trust analysis method; noninterference policy; Data security; Equations; Information science; Interference; Process control; Trajectory; Controlled exchange; Noninterference policy; Process behavior; Trust;
Conference_Titel :
Mechatronic Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference on
Conference_Location :
Shengyang
Print_ISBN :
978-1-4799-2564-3
DOI :
10.1109/MEC.2013.6885406