[1]TSCHANTZ M C,DATTA A,DATTA A,et al.A methodology for information flow experiments[C]//Proceedings of the 28th Computer Security Foundations Symposium.Washington D.C.,USA:IEEE Press,2015:554-568.
[2]LEI Z,CHEN X S,LIANG L,et al.Trusted domain hierarchical model based on noninterference theory[J].The Journal of China Universities of Posts and Telecommuni-cations,2015,22(4):7-16.
[3]KONG X,CHEN Y,ZHUANG Y.Analysis of system trustworthiness based on information flow noninterference theory[J].Journal of Systems Engineering and Electronics,2015,26(2):367-380.
[4]AZATOV A,CONTINO R,MACHADO C S,et al.Helicity selection rules and noninterference for BSM amplitudes[J].Physical Review D:Covering Particles,Fields,Gravitation and Cosmology,2017,95(6).
[5]WANG X,KONG X,CHEN X.A dynamic non-interference trust chain model based on security process Algebra[J].TELKOMNIKA Indonesian Journal of Electrical Engineering and Computer Science,2014,12(1):747-752.
[6]MEIER J,ZHOU X,HILLEBRAND A,et al.The epidemic spreading model and the direction of information flow in brain networks[J].NeuroImage,2017,152:639-646.
[7]孔祥营.嵌入式系统可信计算环境构建关键技术研究[D].南京:南京航空航天大学,2015.
[8]KUAN G,NOGIN A,KOPYLOV A,et al.System for information flow security inference through program slicing:US 9,378,377[P].2016-06-28.
(下转第183页)
(上接第177页)
[9]SCHMITZ T,RHODES D,AUSTIN T H,et al.Faceted dynamic information flow via control and data monads[C]//Proceedings of International Conference on Principles of Security and Trust.Berlin,Germany:Springer,2016:3-23.
[10]WEI J,WANG F,LINDELL M K.The evolution of stakeholders’ perceptions of disaster:a model of information flow[J].Journal of the Association for Information Science and Technology,2016,67(2):441-453.
[11]徐甫.支持进程代码修改的非传递无干扰可信模型[J].计算机工程,2013,39(11):150-153.
[12]ZHAO Y,SANN D,ZHANG F,et al.Reasoning about information flow security of separation kernels with channel-based communication[C]//Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems.Berlin,Germany:Springer,2016:791-810.
[13]JOHN R.Noninterference,transitivity,and channel-control security policies:CSL-92-02[R].SRI International Computer Science Laboratory,1992.
[14]吕从东.基于无干扰模型的云计算中信息流安全研究[D].北京:北京交通大学,2016.
[15]LESLIE R.Dynamic intransitive noninterference[C]//Proceedings of the 1st IEEE International Symposium on Secure Software Engineering.Washington D.C.,USA:IEEE Press,2006:3-7. |