Paper Title:
Enumeration Based Security Behavior Model Checking Algorithm
  Abstract

Model Carrying Code(MCC) provides a way to safe execution of untrusted code by taking both mobile code producer and consumers into consideration, where it checks mobile code security by comparing security related program behavior model with security policies. In this paper an enumeration based algorithm to checking security related behavior with respect to security policy has been given, where security behavior has been modeled as extended context free grammar and the security policy has been specified as extended FSA. Solutions to dealing with loops and recursions have been introduced. A program has been developed for implementing the algorithm, and several experiments have been done. It has been indicated that our algorithm can effectively check small scale security behavior models on the basis of simple security policies.

  Info
Periodical
Edited by
Qi Luo
Pages
808-813
DOI
10.4028/www.scientific.net/AMM.20-23.808
Citation
H. X. Liu, Y. Jin, "Enumeration Based Security Behavior Model Checking Algorithm", Applied Mechanics and Materials, Vols. 20-23, pp. 808-813, 2010
Online since
January 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Wen Gang Chen, Xiao Jie Song, Wei Liu
Chapter 9: Environmentally Sustainable Manufacturing Processes and Systems
Abstract:Ubiquitous Computing has been viewed as the promising computing mode and noticed universally. The security problem gets more important. This...
1397
Authors: Yu Juan Hu, Qing Wei Meng
Chapter 22: Metrology and Measurement
Abstract:Security of computer information system more and more aroused people’s attention, and information security assessment and computer system...
1684
Authors: Cong Chen
Chapter 3: Active Materials, Mechanics and Behavior
Abstract:The ubiquitous network and it provides the high quality wireless service, all depends on the wireless communication system network security...
297
Authors: Zhong Cheng Li, Bu Han Zhang, Cheng Xiong Mao, Kui Wang
Chapter 6: Power System and Automation
Abstract:With the proportion of the installed capacity of wind farm in the grid increasing, the impact of wind farm on the power system security...
1332
Authors: You Chan Zhu, Peng Liu, Jun Ting Wang
Chapter 2: Computer Science and Computational Science, Information Processing
Abstract:This paper first introduces the definition of cloud security, then analyzes security research status, finally puts forward to three-layer...
415