泛在网络环境下隐蔽通道关键技术研究综述
李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川 - 通信学报, 2022 - infocomm-journal.com
在泛在网络环境下, 隐蔽通道通过修改系统共享资源, 绕开系统的安全策略传输隐蔽信息,
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …
A classification of security properties for process algebras
R Focardi, R Gorrieri - Journal of Computer security, 1995 - content.iospress.com
Several information flow security definitions, proposed in the literature, are generalized and
adapted to the model of labelled transition systems. This very general model has been …
adapted to the model of labelled transition systems. This very general model has been …
ERODE: a tool for the evaluation and reduction of ordinary differential equations
We present ERODE, a multi-platform tool for the solution and exact reduction of systems of
ordinary differential equations (ODEs). ERODE supports two recently introduced …
ordinary differential equations (ODEs). ERODE supports two recently introduced …
Quantifying opacity
Opacity is a general language-theoretic framework in which several security properties of a
system can be expressed. Its parameters are a predicate, given as a subset of runs of the …
system can be expressed. Its parameters are a predicate, given as a subset of runs of the …
A behavioral distance for fuzzy-transition systems
In contrast with the existing approaches to exact bisimulation for fuzzy systems, we introduce
a robust notion of behavioral distance to measure the behavioral similarity of …
a robust notion of behavioral distance to measure the behavioral similarity of …
Information flow security in dynamic contexts
We study information flow security in the setting of mobile agents. We propose a sufficient
condition to security named Persistent_BNDC. A process is Persistent_BNDC when every of …
condition to security named Persistent_BNDC. A process is Persistent_BNDC when every of …
Non-interference for deterministic interactive programs
We consider the problem of defining an appropriate notion of non-interference (NI) for
deterministic interactive programs. Previous work on the security of interactive programs by …
deterministic interactive programs. Previous work on the security of interactive programs by …
[HTML][HTML] Back to the format: A survey on SOS for probabilistic processes
In probabilistic process algebras the classic qualitative description of process behaviour is
enriched with quantitative information on it, usually modelled in terms of probabilistic …
enriched with quantitative information on it, usually modelled in terms of probabilistic …
A probabilistic applied pi–calculus
We propose an extension of the Applied Pi–calculus by introducing nondeterministic and
probabilistic choice operators. The semantics of the resulting model, in which probability and …
probabilistic choice operators. The semantics of the resulting model, in which probability and …
Logical characterization of bisimulation metrics
Bisimulation metrics provide a robust and accurate approach to study the behavior of
nondeterministic probabilistic processes. In this paper, we propose a logical characterization …
nondeterministic probabilistic processes. In this paper, we propose a logical characterization …