Jingming Wang: Iteration Composition Analysis of Noninter-ference in Cyber
نویسنده
چکیده
At present, a rather big challenge to model cyber-physical systems is to stand for the interactions between physical level and cyber level. Researchers are faced with the trouble in the analysis of information security property of noninterference in cyber-physical systems because of the physical components and behavior appended to cyber components and systems. A new method is put forward with Petri net for working out this problem effectively by composing the complicated and large systems with simple and small systems. Meanwhile, it accomplishes the noninterference information flow security property. In this paper, this method is used to analyze the information security property of noninterference and its iteration composition in cyber-physical systems. This research provides a new formal method to explore information security property of noninterference and a sufficiency and necessary condition of iteration composition of noninterference of information security model in cyber-physical systems.
منابع مشابه
Analysis of the Composition of Non-Deducibility in Cyber-Physical Systems
Cyber-Physical Systems (CPSs) are integrations of computation and physical processes. Now researchers are confronted with the difficulty in the analysis and verification of information confidentiality in complex CPSs owing to physically observable behavior and physical components appended to cyber systems. This problem can be solved effectively by using some simple or small systems to compose t...
متن کاملJINGMING WANG et al: PARALLEL COMPOSITION ANALYSIS OF NON-INTERFERENCE IN CYBER
At present, a rather big challenge to model cyber-physical systems is to stand for the interactions between physical level and cyber level. Researchers are faced with the trouble in the analysis of information security property of noninterference in cyber-physical systems because of the physical components and behavior appended to cyber components and systems. A new method is put forward with P...
متن کاملAnalysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic
The COVID-19 pandemic was a remarkable and unprecedented event that changed the lives of billions of citizens around the world and resulted in what is known as a new term in terms of social norms and lifestyles. In addition to the tremendous impact on society and business in general, the epidemic created a unique set of cybercrime circumstances that also affected society and business. Increased...
متن کاملThe Model of Structural Relationships of Cyber-Aggression Based on Family Communication Pattern with the Mediating Role of Addiction to Internet
Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کامل