-
181
Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking
Published 2017-07-01“…Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.…”
Get full text
Article -
182
Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking
Published 2017-07-01“…Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.…”
Get full text
Article -
183
Constraint Generation for the Jeeves Privacy Language
Published 2014“…We also present and implement the associated translation to J, but here formulated by a completed and decompositional operational semantic formulation. Finally, we present an enhanced and decompositional, non-substitutional operational semantic formulation and implementation of the J evaluation engine (the dynamic semantics) with privacy constraints. …”
Get full text
-
184
La estructura fonológica de la lengua china: introducción al estudio de los tonos
Published 1984-12-01“…These four tones produce alterations depending on the way they become combined, this operating semantic and syntactic differentiations. An essential matter refering to the Chinese speech, the tone acquires extraordinary importance within the poetical creation. …”
Get full text
Article -
185
Austere Realism: Contextual Semantics Meets Minimal Ontology, by Terence Horgan and Matjaž Potrč
Published 2018“…On the language side, they argue for a semantic theory (contextual semantics) according to which the truth of a statement or thought just is its being semantically correct under contextually operative semantic standards. Their semantic thesis allows H&P to avoid the following inconsistent duo: (M) There are mountains in North America. …”
Get full text
Get full text
Article -
186
From Fact Drafts to Operational Systems: Semantic Search in Legal Decisions Using Fact Drafts
Published 2024-12-01“…These insights led to an operational semantic search system for a prominent legal content provider.…”
Get full text
Article -
187
Cross-network access control mechanism for complex network environment
Published 2018-02-01“…Complex network environments,such as space-ground integrated networks,internet of things and complex private networks,have some typical characteristics,e.g.,integration of multi-network and information flow in cross-network.These characteristics bring access control for complex network environment the new requirement of coarse-grained control,sticky policies and inconsistent operation semantics.To satisfy these requirements,cross-network access control mechanism in complex network environments (CACCN) was designed by mapping the cyberspace-oriented access control.First of all,the process of mapping was illustrated using the example of space-ground integrated networks.Next,a management model was proposed to manage the control elements in CACCN and a series of management functions were designed by using Z-notation.The analysis on practical example demonstrates that the mechanism can satisfy a series of access control requirements.…”
Get full text
Article -
188
Cross-network access control mechanism for complex network environment
Published 2018-02-01“…Complex network environments,such as space-ground integrated networks,internet of things and complex private networks,have some typical characteristics,e.g.,integration of multi-network and information flow in cross-network.These characteristics bring access control for complex network environment the new requirement of coarse-grained control,sticky policies and inconsistent operation semantics.To satisfy these requirements,cross-network access control mechanism in complex network environments (CACCN) was designed by mapping the cyberspace-oriented access control.First of all,the process of mapping was illustrated using the example of space-ground integrated networks.Next,a management model was proposed to manage the control elements in CACCN and a series of management functions were designed by using Z-notation.The analysis on practical example demonstrates that the mechanism can satisfy a series of access control requirements.…”
Get full text
Article -
189
Research on verification of behavior requirement patterns based on action sequences
Published 2011-01-01“…Function behavior requirements(FBR) and safety behavior requirements(SBR) were described by action se-quences.Compared with the traditional logic or graphic form,action sequences can express the temporal relationship among interactive behaviors more exactly.Moreover,FBR pattern and SBR pattern are constructed by action sequences,and the operation semantics of these patterns are also given.To implement the requirement verification based on behavior patterns,the necessary and sufficient conditions as well as the checking algorithm for the satisfiability of FBR pattern and SBR pattern are presented and proven by redefining the property expression and combination operation of LTS’s safety and liveness.The framework has been widely applied in the formal verification & validation of component-based CTCS2/3 systems,and has shown great theoretical and practical significance to combinational verification of Compo-nent-based safety-critical systems.…”
Get full text
Article -
190
Research on verification of behavior requirement patterns based on action sequences
Published 2011-01-01“…Function behavior requirements(FBR) and safety behavior requirements(SBR) were described by action se-quences.Compared with the traditional logic or graphic form,action sequences can express the temporal relationship among interactive behaviors more exactly.Moreover,FBR pattern and SBR pattern are constructed by action sequences,and the operation semantics of these patterns are also given.To implement the requirement verification based on behavior patterns,the necessary and sufficient conditions as well as the checking algorithm for the satisfiability of FBR pattern and SBR pattern are presented and proven by redefining the property expression and combination operation of LTS’s safety and liveness.The framework has been widely applied in the formal verification & validation of component-based CTCS2/3 systems,and has shown great theoretical and practical significance to combinational verification of Compo-nent-based safety-critical systems.…”
Get full text
Article -
191
A mathematical game semantics of concurrency and nondeterminism
Published 2015“…However, such a closure operator semantics has not been investigated in the more general nondeterministic case. …”
Conference item -
192
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01“…Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.…”
Get full text
Article -
193
From Affective Science to Psychiatric Disorder: Ontology as a Semantic Bridge
Published 2018-10-01“…This effort further draws on developments in formal ontology regarding the distinction between normal and abnormal in order to formalize the interconnections. This operational semantic framework is relevant for applications including clarifying psychiatric diagnostic categories, clinical information systems, and the integration and translation of research results across disciplines.…”
Get full text
Article -
194
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01“…Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.…”
Get full text
Article -
195
A formal analysis method for composition protocol based on model checking
Published 2022-05-01“…To solve this problem, firstly, a formal analysis method for composition protocol based on SPIN is proposed, and a formal description of protocol operation semantics is given. Then the attacker model is formalized, and a message specification method based on field detection and component recognition is presented to alleviate the state explosion problem. …”
Get full text
Article -
196
Resolving Distributed Knowledge
Published 2016-06-01“…The R_G operators are called resolution operators. Semantically, we say that an expression R_Gφ is true iff φ is true in what van Benthem [11, p. 249] calls (G's) communication core; the model update obtained by removing links to states for members of G that are not linked by all members of G. …”
Get full text
Article -
197
Segmentation of Drilled Holes in Texture Wooden Furniture Panels Using Deep Neural Network
Published 2021-05-01“…We show that even a lightweight architecture is capable to perform on a range of complex textures and is able to distinguish the holes drilling operations’ semantical information from the rest of the furniture board and conveyor context. …”
Get full text
Article -
198
Partial-order Boolean games: informational independence in a logic-based model of strategic interaction
Published 2015“…We also show that the concurrency in partial-order Boolean games can be modelled using a closure-operator semantics, and conclude by considering the relationship of our model to Independence-Friendly (IF) logic.…”
Journal article -
199
Study on Path Planning in Cotton Fields Based on Prior Navigation Information
Published 2024-11-01“…Considering the dual attributes of walking and the operation of agricultural machinery, four kinds of operation semantic points were embedded into the path. Finally, path generation software was designed. …”
Get full text
Article -
200
TRANSFORMASI CHANNEL SYSTEM KE LABELLED TRANSITION SYSTEM
Published 2012“…Through the concept of parallelism, the algorithm is run by exploiting the so-called SOS (Structured Operational Semantic) approach. Transformation algorithm is implemented by developing a prototype tool designed with 3 essential components, input, process and output. …”
Thesis