Computer Science ›› 2019, Vol. 46 ›› Issue (2): 139-144.doi: 10.11896/j.issn.1002-137X.2019.02.022
• Information Security • Previous Articles Next Articles
WANG Xue-jian, ZHAO Guo-lei, CHANG Chao-wen, WANG Rui-yun
CLC Number:
[1]JANCZEWSKI,LECH J,ANDREW M.Information Security Policy[J].IEEE Software,2005,17(5):26-32. [2]ADETOYE A O,BADII A.A Policy Model for Secure Information Flow[C]∥ Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security.Springer Berlin Heidelberg,2009:1-17. [3]DENNING D E.Certification of programs for secure information flow[J].Communications of the Acm,1977,20(20):504-513. [4]YANG P,WANG Q,MI X,et al.An Improved BLP Model with More Flexibility[C]∥ International Conference on Embedded Software and Systems.IEEE,2017:192-197. [5]LIU G,ZHANG J,LIU J,et al.Improved Biba model based on trusted computing[J].Security & Communication Networks,2015,8(16):2793-2797. [6]GOGUEN J A,MESEGUER J.Unwinding and Inference Control[C]∥ 1984 IEEE Symposium on Security and Privacy.IEEE,2016:75. [7]OLMEDO M T C,MAS J F.Markov Chain[M]∥Geomatic Approaches for Modeling Land Change Scenarios.2018. [8]HASUO I.Generic Forward and Backward Simulations II:Pro- babilistic Simulation[C]∥International Conference on Concurrency Theory.Springer-Verlag,2010:447-461. [9]REZAEI F,HEMPEL M,RAKSHIT S M,et al.Automated Covert Channel Modeling over a real network platform[C]∥Wireless Communications and Mobile Computing Conference.IEEE,2014:559-564. [10]BARR T W,RIXNER S.Medusa:managing concurrency and communication in embedded systems[C]∥Usenix Conference on Usenix Technical Conference.USENIX Association,2014:439-450. [11]LAMPSON B W.Computer security in the real world[J].Computer,2004,37(6):37-46. [12]KAUR J,WENDZEL S,EISSA O,et al.Covert channel-internal control protocols:attacks and defense[J].Security & Communication Networks,2016,9(15):2986-2997. [13]YANG C H,WANG H Y.Modeling and Weaving of Stateful Aspects of Architecture Layer——Based on LTS Method[J].Chinese Journal of Computers,2011,34(2):342-352.(in Chinese) 杨春花,王海洋.体系结构层状态型方面的建模和编织——基于LTS的方法[J].计算机学报,2011,34(2):342-352. [14]RYAN P Y A.Mathematical Models of Computer Security[M]∥ Computer Security Handbook,Sixth Edition.John Wiley & Sons Inc.,2000:1-62. [15]ALDINI A,BRAVETTI M,GORRIERI R.A process-algebraic approach for the analysis of probabilistic noninterference[J].Journal of Computer Security,2004,12(2):191-245. [16]GUNAWAN L A,HERRMANN P.Compositional Verification of Application-Level Security Properties[M]∥Engineering Secure Software and Systems.Springer Berlin Heidelberg,2013:75-90. [17]NANEVSKI A,BANERJEE A,GARG D.Verification of Information Flow and Access Control Policies with Dependent Types[C]∥IEEE Symposium on Security and Privacy.IEEE Compu-ter Society,2011:165-179. [18]DENNING,DOROTHY E.Framework and principles for active cyber defense[J].Computers & Security,2014,40:108-113. |
[1] | LI Rong-fan, ZHONG Ting, WU Jin, ZHOU Fan, KUANG Ping. Spatio-Temporal Attention-based Kriging for Land Deformation Data Interpolation [J]. Computer Science, 2022, 49(8): 33-39. |
[2] | LI Xia, MA Qian, BAI Mei, WANG Xi-te, LI Guan-yu, NING Bo. RIIM:Real-Time Imputation Based on Individual Models [J]. Computer Science, 2022, 49(8): 56-63. |
[3] | WEI Kai-xuan, FU Ying. Re-parameterized Multi-scale Fusion Network for Efficient Extreme Low-light Raw Denoising [J]. Computer Science, 2022, 49(8): 120-126. |
[4] | TAN Ying-ying, WANG Jun-li, ZHANG Chao-bo. Review of Text Classification Methods Based on Graph Convolutional Network [J]. Computer Science, 2022, 49(8): 205-216. |
[5] | PAN Zhi-yong, CHENG Bao-lei, FAN Jian-xi, BIAN Qing-rong. Algorithm to Construct Node-independent Spanning Trees in Data Center Network BCDC [J]. Computer Science, 2022, 49(7): 287-296. |
[6] | SUN Xiao-han, ZHANG Li. Collaborative Filtering Recommendation Algorithm Based on Rating Region Subspace [J]. Computer Science, 2022, 49(7): 50-56. |
[7] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[8] | MENG Yue-bo, MU Si-rong, LIU Guang-hui, XU Sheng-jun, HAN Jiu-qiang. Person Re-identification Method Based on GoogLeNet-GMP Based on Vector Attention Mechanism [J]. Computer Science, 2022, 49(7): 142-147. |
[9] | SHAN Xiao-ying, REN Ying-chun. Fishing Type Identification of Marine Fishing Vessels Based on Support Vector Machine Optimized by Improved Sparrow Search Algorithm [J]. Computer Science, 2022, 49(6A): 211-216. |
[10] | LI Dan-dan, WU Yu-xiang, ZHU Cong-cong, LI Zhong-kang. Improved Sparrow Search Algorithm Based on A Variety of Improved Strategies [J]. Computer Science, 2022, 49(6A): 217-222. |
[11] | YANG Yue, FENG Tao, LIANG Hong, YANG Yang. Image Arbitrary Style Transfer via Criss-cross Attention [J]. Computer Science, 2022, 49(6A): 345-352. |
[12] | HAO Qiang, LI Jie, ZHANG Man, WANG Lu. Spatial Non-cooperative Target Components Recognition Algorithm Based on Improved YOLOv3 [J]. Computer Science, 2022, 49(6A): 358-362. |
[13] | WANG Jin, LIU Jiang. GPU-based Parallel DILU Preconditioning Technique [J]. Computer Science, 2022, 49(6): 108-118. |
[14] | SHAO Yan-hua, LI Wen-feng, ZHANG Xiao-qiang, CHU Hong-yu, RAO Yun-bo, CHEN Lu. Aerial Violence Recognition Based on Spatial-Temporal Graph Convolutional Networks and Attention Model [J]. Computer Science, 2022, 49(6): 254-261. |
[15] | JIN Li-zhen, LI Qing-zhong. Fast Structural Texture Image Synthesis Algorithm Based on Seam ConsistencyCriterion [J]. Computer Science, 2022, 49(6): 262-268. |
|