Citation: | ZHUANG Lu, CAI Mian, SHEN Chang-xiang. Hierarchical Verification of Behavior Trustworthiness[J]. Journal of Beijing University of Technology, 2012, 38(9): 1396-1401. |
[01] |
].https:∥www.trustedcomputinggroup.org/groups/TCG_1_4_Architecture_Overview.pdf.
|
[2] |
PENG G J, PAN X C, FU J M, et al.Static extractingmethod of software indended behavior based on APIfunctions invoking[J].Wuhan University Journal ofNatural Sciences, 2008, 13 (5) :615-620.
|
[3] |
PENG G J, PAN X C, ZHANG H G, et al.Dynamictrustiness authentication framework based on software'sbehavior integrity[C]∥Proceedings of the 9thInternational Conference for Young Computer Scientists.Hunan:IEEE Computer Society Press, 2008:2283-2288.
|
[4] |
屈延文.软件行为学[M].北京:电子工业出版社, 2004:1-101.
|
[5] |
庄琭, 蔡勉, 李晨.基于软件行为的可信动态度量[J].武汉大学学报:理学版, 2010, 56 (2) :133-137.ZHUANG Lu, CAI Mian, LI Chen.Software behavior-based trusted dynamic measurement[J].Journal of WuhanUniversity:Natural Science Edition, 2010, 56 (2) :133-137. (in Chinese)
|
[6] |
EMERSON E A, SISTLA A P.Symmetry and modelchecking[C]∥Proceedings of the 5th Workshop onComputer-Aided Verification.Heraklion:Springer Verlag, 1993:463-478.
|
[7] |
CLARKE E M, EMERSON E A, SISTLA A P.Automaticverification of finite state concurrent systemsusing temporal logic specification[J].ACM Transactionson Programming Languages and Systems, 1986, 8 (2) :244-263.
|
[8] |
王永祥, 吴尽昭, 蒋建民.进程代数——对称与动作细化[M].北京:科学出版社, 2007:75-77.
|
[9] |
TRETMANS J.Conformance testing with labelled transitionsystems:implementation relations testing generation[J].Computer Networks and ISDN Systems, 1996, 29:49-79.
|
[10] |
WINSKEL G.An introduction to event structures[M]∥Linear Time, Branching Time and Partial Order in Logicsand Models for Concurrency.Berlin:Springer-Verlag, 1989, 354:364-397.
|
[11] |
BELL D, LAPADULA L.Secure computer systems:mathmatical foundations, MTR-2547[R].Bedford, MA:MITRE Corporation, 1973.
|
[1] | HU Yongli, LI Ouxiao, SUN Yanfeng. Sub-structure Representative Hierarchical Pooling Graph Convolutional Network Model Based on Node Sampling[J]. Journal of Beijing University of Technology, 2024, 50(6): 693-701. DOI: 10.11936/bjutxb2022030009 |
[2] | WANG Xiao, ZHANG Jianbiao, ZENG Zhiqiang. Construction Method of Trusted Virtual Execution Environment Based on Trusted Platform Control Module[J]. Journal of Beijing University of Technology, 2019, 45(6): 554-565. DOI: 10.11936/bjutxb2018060024 |
[3] | WANG Yong, XU Rongqiang, REN Xingtian, YANG Jianhong. Formal Verification of Establishment of Chain of Trust in Trusted Computing[J]. Journal of Beijing University of Technology, 2016, 42(3): 387-392. DOI: 10.11936/bjutxb2015060066 |
[4] | ZHAO Yong, LIAO Jian-hua, SHEN Chang-xiang. Industry Control System Security Assurance Method Based on Access Verification[J]. Journal of Beijing University of Technology, 2013, 39(12): 1861-1867. |
[5] | CAI Yong-quan, XUE Fei, YANG Yi. Rational Threshold Signature Based on Hierarchical Key[J]. Journal of Beijing University of Technology, 2013, 39(9): 1366-1370. |
[6] | WANG Dan, SUN Hao-yang, WANG Jin, FU Li-hua. Trusted Analysis Model for Interactive Behavior of a Software System Based on Slicing Technology[J]. Journal of Beijing University of Technology, 2013, 39(5): 713-721. |
[7] | CAI Hua-li, LIU Lu, WANG Li. Automated Multiple Hierarchical Classification of Web News of Unexpected Events[J]. Journal of Beijing University of Technology, 2011, 37(6): 947-954. |
[8] | SUN Guo-zi, GENG Wei-ming, CHEN Dan-wei, LIN Qing-xiu. One Trusted Fix Method of Digital Data Forensics[J]. Journal of Beijing University of Technology, 2010, 36(5): 621-626. |
[9] | SHEN Qing-ni, DU Hong, QING Si-han. Hierarchal Security Architecture of Virtualized Trusted Platform[J]. Journal of Beijing University of Technology, 2010, 36(5): 605-610. |
[10] | ZHANG Li-qiang, ZHANG Huan-guo, ZHANG Fan. The Trust Measurement Scheme in Trusted Computing[J]. Journal of Beijing University of Technology, 2010, 36(5): 586-591. |