JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (3): 35-42.doi: 10.6040/j.issn.1671-9352.2.2019.124
XU Ming-di1, JIN Zhao-yang1, CUI Feng1, ZHANG Fan2*
CLC Number:
[1] SIIRTOLA A. Parametrised interface automata[C] // 14th International Conference on Application of Concurrency to System Design(ACSD).[S.l.] : IEEE, 2014. [2] 孙聪, 习宁, 高胜, 等. 基于接口精化的广义无干扰性研究[J]. 计算机研究与发展, 2015, 52(7):1631-1641. SUN Cong, XI Ning, GAO Sheng, et al. A generalized non-interference based on refinement of interfaces[J]. Journal of Computer Research and Development, 2015, 52(7):1631-1641. [3] FENDRICH S, LÜTTGEN G. A generalised theory of interface automata, component compatibility and error[J]. Acta Informatica, 2019, 56(4):287-319. [4] GOGUEN J A, MESEGUER J. Security policies and security models[C] // 1982 IEEE Symposium on Security and Privacy, April 26-28, 1982. Oakland: IEEE, 1982. [5] BEN SAID N, ABDELLATIF T, BENSALEM S, et al. Model-driven information flow security for component-based systems[M] //From Programs to Systems. The Systems Perspective in Computing. Berlin: Springer, 2014: 1-20. [6] 张驰, 褚楚. 软件组件组装行为兼容性检查研究[J]. 计算机工程与应用, 2016, 52(11):30-33. ZHANG Chi, CHU Chu. Research on verifying of behavioral compatibility for software component composition[J]. Computer Engineering and Applications, 2016, 52(11):30-33. [7] BOSSI A, FOCARDI R, PIAZZA C, et al. Bisimulation and unwinding for verifying possibilistic security properties[C] // International Workshop on Verification, Model Checking, and Abstract Interpretation. Berlin: Springer, 2003: 223-237. [8] LEE M, D'ARGENIO P R. A refinement based notion of non-interference for interface automata: compositionality, decidability and synthesis[C] // XXIX International Conference of the Chilean Computer Science Society. Antofagasta: IEEE Computer Society, 2010. [9] SUN C, XI N, MA J F. Enforcing generalized refinement-based noninterference for secure interface composition[C] // 2017 IEEE 41st Annual Computer Software and Applications Conference(COMPSAC). Turin: IEEE, 2017. [10] DE ALFARO L, HENZINGER T A. Interface theories for component-based design[C] // International Workshop on Embedded Software. Berlin: Springer, 2001: 148-165. [11] FOCARDI R, GORRIERI R. A classification of security properties for process Algebras1[J]. Journal of Computer Security, 1995, 3(1):5-33. [12] DE ALFARO L, HENZINGER T A. Interface automata[J]. ACM SIGSOFT Software Engineering Notes, 2001, 26(5):109. [13] 周伟, 尹青, 郭金庚. 计算机安全中的无干扰模型[J]. 计算机科学, 2005, 32(2):159-165. ZHOU Wei, YIN Qing, GUO Jingeng. Non-interference models in computer security[J]. Computer Science, 2005, 32(2):159-165. |
[1] | SUN Yu1, CHEN Ya-sha2, ZHANG Xing1, LIU Yi1. Security assurance method based on non-interference [J]. J4, 2011, 46(9): 28-34. |
|