Jingming Wang: Iteration Composition Analysis of Noninter-ference in Cyber

نویسنده

  • JingMing Wang
چکیده

At present, a rather big challenge to model cyber-physical systems is to stand for the interactions between physical level and cyber level. Researchers are faced with the trouble in the analysis of information security property of noninterference in cyber-physical systems because of the physical components and behavior appended to cyber components and systems. A new method is put forward with Petri net for working out this problem effectively by composing the complicated and large systems with simple and small systems. Meanwhile, it accomplishes the noninterference information flow security property. In this paper, this method is used to analyze the information security property of noninterference and its iteration composition in cyber-physical systems. This research provides a new formal method to explore information security property of noninterference and a sufficiency and necessary condition of iteration composition of noninterference of information security model in cyber-physical systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of the Composition of Non-Deducibility in Cyber-Physical Systems

Cyber-Physical Systems (CPSs) are integrations of computation and physical processes. Now researchers are confronted with the difficulty in the analysis and verification of information confidentiality in complex CPSs owing to physically observable behavior and physical components appended to cyber systems. This problem can be solved effectively by using some simple or small systems to compose t...

متن کامل

JINGMING WANG et al: PARALLEL COMPOSITION ANALYSIS OF NON-INTERFERENCE IN CYBER

At present, a rather big challenge to model cyber-physical systems is to stand for the interactions between physical level and cyber level. Researchers are faced with the trouble in the analysis of information security property of noninterference in cyber-physical systems because of the physical components and behavior appended to cyber components and systems. A new method is put forward with P...

متن کامل

Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic

The COVID-19 pandemic was a remarkable and unprecedented event that changed the lives of billions of citizens around the world and resulted in what is known as a new term in terms of social norms and lifestyles. In addition to the tremendous impact on society and business in general, the epidemic created a unique set of cybercrime circumstances that also affected society and business. Increased...

متن کامل

The Model of Structural Relationships of Cyber-Aggression Based on Family Communication Pattern with the Mediating Role of Addiction to Internet

Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating  role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016