Abstract
In this paper, research is carried out with a hot issue in current trusted software research as the main content – component-based trusted software construction and its key theory and technology. In this paper, based on characteristics of trusted components, we analyze the related properties of trusted components on the basis of our proposed OR-transition Petri net-based component description and modeling work, and on this basis, propose benign concept of component, and put forward method of abstracting operation in trusted component.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu, K., Shan, Z., Wang, J., He, J., Zhang, Z., Qin, Y.: Overview on major research plan of trustworthy software. Bull. Natl. Nat. Sci. Found. China 22(3), 145–151 (2008)
Yu, Y., Li, T., Liu, Q., Dai, F., Zhao, N.: OR-transition colored petri net and its application in modeling software system. In: Proceedings of 2009 International Workshop on Knowledge Discovery and Data Mining, January 2009, Moscow, Russia, pp. 15–18 (2009)
Bernstein, L., Yuhas, C.: Trustworthy Systems Through Quantitative Software Engineering. Quantitative Software Engineering. Wiley-IEEE Computer Society Press, New York (2005). Silver Spring MD
Ding, B., Wang, H.M., Shi, D.X., Li, X.: Component model supporting trustworthiness-oriented software evolution. J. Soft. 22(1), 17–27 (2011). http://xueshu.baidu.com/s?wd=author%3A%28LI%20Xiao%29%20School%20of%20Computer%20National%20University%20of%20Defense%20Technology&tn=SE_baiduxueshu_c1gjeupa&ie=utf-8&sc_f_para=sc_hilight%3Dperson
Yang, H.J., Zheng, S.: Software evolution for moving into and moving within internetware paradigm. Int. J. Softw. Inf. 7(1), 41–61 (2013)
Jia, Y.H., Zheng, S.: Software evolution based on service-oriented requirement in internetware. In: 4th International Conference on Computer Research and Development, pp. 20–25. IACSIT Press, Singapore (2012)
Secure Software, Inc. The CLASP Application Security Process (2005). http://www.ida.liu.se/~TDDC90/papers/clasp_external.pdf
Zhao, H., Sun, J.: An algebraic model of internetware software architecture. Sci. Sinica 43(1), 161 (2013)
Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC: Comput. Mater. Continua 56(2), 273–283 (2018)
Chen, X.: New system based on event-driven and service-oriented business activity monitoring design and implementation. Appl. Res. Comput. 29(3), 977–980 (2012)
Panwar, P., Garg, A.: Analysis of reliability and cost tradeoffs in architecture based software applications using a genetic algorithm. Int. J. Comput. Appl. 72(1), 33–37 (2013)
Qiuying, L., Haifeng, L., Guodong, W.: Sensitivity analysis on the influence factors of software reliability based on diagnosis reasoning. Adv. Intell. Syst. Comput. 180, 557–566 (2013)
Shanmugapriya, P., Suresh, R.M.: Software architecture evaluation methods−a survey. Int. J. Comput. Appl. 49(16), 19–26 (2012)
Franco, J.M., Barbosa, R., Zenha-Rela, M.: Reliability analysis of software architecture evolution. In: Sixth Latin-American Symposium on Dependable Computing (LADC), Rio de Janeiro, Brazil, pp. 11–20 (2013)
Rathod, H., Parmar, M.: Study of genetic approach in estimating reliability of component based software. PARIPEX - Indian J. Res. 1(11), 17–19 (2012)
Wang, J., Chen, W.R.: A reliability-oriented evolution method of software architecture based on contribution degree of component. J. Softw. 7(8), 1744–1750 (2012)
Han, W., Tian, Z., Huang, Z., Li, S., Jia, Y.: Bidirectional self-adaptive resampling in imbalanced big data learning. Multimedia Tools Appl. (2018). https://doi.org/10.1007/s11042-018-6938-9
Liu, Y.P., Xu, C., Cheung, S.C.: diagnosing energy efficiency and performance for mobile internetware applications. IEEE Softw. 32(1), 67–75 (2013)
Chargo, J.T.: Automated software architecture extraction using graph-based clustering. Graduate Theses and Dissertations, Iowa State University (2013)
Li, S., Wu, X., Zhao, D., Li, A., Tian, Z., Yang, X.: An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments. PLoS ONE 13(10), e0202657 (2018)
Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Securing display path for security-sensitive applications on mobile devices. CMC: Comput. Mater. Continua 55(1), 017–035 (2018)
Acknowledgments
Project funded by the National Science Foundation of China under Grant (No. 61462091, U1803263, 61672020, 61866039), by the Data Driven Software Engineering innovation team of Yunnan province (No. 2017HC012); by China Postdoctoral Science Foundation (No. 2013M542560, 2015T81129), A Project of Shandong Province Higher Educational Science and Technology Program (No. J16LN61).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Yu, Y., Jing, M., Ji, D., Wang, Y., Xie, Z., Li, S. (2019). Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_40
Download citation
DOI: https://doi.org/10.1007/978-3-030-24268-8_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24267-1
Online ISBN: 978-3-030-24268-8
eBook Packages: Computer ScienceComputer Science (R0)