Skip to main content

Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11635))

Included in the following conference series:

  • 2135 Accesses

Abstract

In this paper, research is carried out with a hot issue in current trusted software research as the main content – component-based trusted software construction and its key theory and technology. In this paper, based on characteristics of trusted components, we analyze the related properties of trusted components on the basis of our proposed OR-transition Petri net-based component description and modeling work, and on this basis, propose benign concept of component, and put forward method of abstracting operation in trusted component.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, K., Shan, Z., Wang, J., He, J., Zhang, Z., Qin, Y.: Overview on major research plan of trustworthy software. Bull. Natl. Nat. Sci. Found. China 22(3), 145–151 (2008)

    Google Scholar 

  2. Yu, Y., Li, T., Liu, Q., Dai, F., Zhao, N.: OR-transition colored petri net and its application in modeling software system. In: Proceedings of 2009 International Workshop on Knowledge Discovery and Data Mining, January 2009, Moscow, Russia, pp. 15–18 (2009)

    Google Scholar 

  3. Bernstein, L., Yuhas, C.: Trustworthy Systems Through Quantitative Software Engineering. Quantitative Software Engineering. Wiley-IEEE Computer Society Press, New York (2005). Silver Spring MD

    Book  Google Scholar 

  4. Ding, B., Wang, H.M., Shi, D.X., Li, X.: Component model supporting trustworthiness-oriented software evolution. J. Soft. 22(1), 17–27 (2011). http://xueshu.baidu.com/s?wd=author%3A%28LI%20Xiao%29%20School%20of%20Computer%20National%20University%20of%20Defense%20Technology&tn=SE_baiduxueshu_c1gjeupa&ie=utf-8&sc_f_para=sc_hilight%3Dperson

  5. Yang, H.J., Zheng, S.: Software evolution for moving into and moving within internetware paradigm. Int. J. Softw. Inf. 7(1), 41–61 (2013)

    MathSciNet  Google Scholar 

  6. Jia, Y.H., Zheng, S.: Software evolution based on service-oriented requirement in internetware. In: 4th International Conference on Computer Research and Development, pp. 20–25. IACSIT Press, Singapore (2012)

    Google Scholar 

  7. Secure Software, Inc. The CLASP Application Security Process (2005). http://www.ida.liu.se/~TDDC90/papers/clasp_external.pdf

  8. Zhao, H., Sun, J.: An algebraic model of internetware software architecture. Sci. Sinica 43(1), 161 (2013)

    Google Scholar 

  9. Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC: Comput. Mater. Continua 56(2), 273–283 (2018)

    Google Scholar 

  10. Chen, X.: New system based on event-driven and service-oriented business activity monitoring design and implementation. Appl. Res. Comput. 29(3), 977–980 (2012)

    Google Scholar 

  11. Panwar, P., Garg, A.: Analysis of reliability and cost tradeoffs in architecture based software applications using a genetic algorithm. Int. J. Comput. Appl. 72(1), 33–37 (2013)

    Google Scholar 

  12. Qiuying, L., Haifeng, L., Guodong, W.: Sensitivity analysis on the influence factors of software reliability based on diagnosis reasoning. Adv. Intell. Syst. Comput. 180, 557–566 (2013)

    Google Scholar 

  13. Shanmugapriya, P., Suresh, R.M.: Software architecture evaluation methods−a survey. Int. J. Comput. Appl. 49(16), 19–26 (2012)

    Google Scholar 

  14. Franco, J.M., Barbosa, R., Zenha-Rela, M.: Reliability analysis of software architecture evolution. In: Sixth Latin-American Symposium on Dependable Computing (LADC), Rio de Janeiro, Brazil, pp. 11–20 (2013)

    Google Scholar 

  15. Rathod, H., Parmar, M.: Study of genetic approach in estimating reliability of component based software. PARIPEX - Indian J. Res. 1(11), 17–19 (2012)

    Google Scholar 

  16. Wang, J., Chen, W.R.: A reliability-oriented evolution method of software architecture based on contribution degree of component. J. Softw. 7(8), 1744–1750 (2012)

    Google Scholar 

  17. Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning. Multimedia Tools Appl. (2018). https://doi.org/10.1007/s11042-018-6938-9

  18. Liu, Y.P., Xu, C., Cheung, S.C.: diagnosing energy efficiency and performance for mobile internetware applications. IEEE Softw. 32(1), 67–75 (2013)

    Article  Google Scholar 

  19. Chargo, J.T.: Automated software architecture extraction using graph-based clustering. Graduate Theses and Dissertations, Iowa State University (2013)

    Google Scholar 

  20. Li, S., Wu, X., Zhao, D., Li, A., Tian, Z., Yang, X.: An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments. PLoS ONE 13(10), e0202657 (2018)

    Article  Google Scholar 

  21. Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Securing display path for security-sensitive applications on mobile devices. CMC: Comput. Mater. Continua 55(1), 017–035 (2018)

    Google Scholar 

Download references

Acknowledgments

Project funded by the National Science Foundation of China under Grant (No. 61462091, U1803263, 61672020, 61866039), by the Data Driven Software Engineering innovation team of Yunnan province (No. 2017HC012); by China Postdoctoral Science Foundation (No. 2013M542560, 2015T81129), A Project of Shandong Province Higher Educational Science and Technology Program (No. J16LN61).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zhongwen Xie or Shudong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, Y., Jing, M., Ji, D., Wang, Y., Xie, Z., Li, S. (2019). Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24268-8_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24267-1

  • Online ISBN: 978-3-030-24268-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics