Journal on Communications ›› 2014, Vol. 35 ›› Issue (12): 144-152.doi: 10.3969/j.issn.1000-436x.2014.12.017

• Paper • Previous Articles     Next Articles

Method for trust analysis of exchange process behavior based on noninterference

Yi SUN1,2,3,Xing-yuan CHEN4,Xue-hui DU2,3,Cheng LEI4   

  1. 1 School of Computer&Information Technology,Beijing Jiaotong University,Beijing 100044,China
    2 The Fourth College,PLA Information Engineering Universiry,Zhengzhou 450004,China
    3 State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450004,China
    4 The Thind College,PLA Information Engineering University,Zhengzhou 450004,China
  • Online:2014-12-25 Published:2017-06-17
  • Supported by:
    The National Basic Research Program of China (973 Program);The National High Technology Research and Development Program of China (863 Program);Innovation Scientists and Technicians Troop Con-struction Projects of Henan Province

Abstract:

Aiming at the problem of dynamic data security exchange behavior cannot be controlled,methods for trusted analysis of exchange process behavior based on noninterference are proposed.First,the exchange behavior model is for-malized from the perspective of the exchange process.Then,the exchange behavior trust constraint rules,exchange be-havior trust judgment theorem and security proof are given in different stages and different mode.Finally,a concrete ap-plication example shows the availability of the method.

Key words: noninterference policy, controlled exchange, process behavior, trust

No Suggested Reading articles found!