Trust analysis method of process behavior for data security exchange


Aiming at the problem of dynamic data security exchange behavior cannot be controlled, we put forward methods for trusted analysis of exchange process behavior based on noninterference. First, the exchange behavior modeling is formalized from the perspective of the exchange process. Then the exchange behavior trust constraint rules are given in different stages and different mode. Finally, exchange behavior trust judgment theorem are given and proved based on noninterference. The method can provide theoretical basis for the behavior analysis of data security exchange system.

Cite this paper

@article{Sun2013TrustAM, title={Trust analysis method of process behavior for data security exchange}, author={Yi Sun and Xingyuan Chen and Xuehui Du}, journal={Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC)}, year={2013}, pages={2162-2167} }