Checkpoint trust evaluation method based on Markov
According to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically.The model reflected the software running situation by s...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2015-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015026/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539670746333184 |
---|---|
author | Jun-feng TIAN Ya-jiao ZHANG |
author_facet | Jun-feng TIAN Ya-jiao ZHANG |
author_sort | Jun-feng TIAN |
collection | DOAJ |
description | According to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically.The model reflected the software running situation by some checkpoints worked in the software behavior trace,then divided some trust levels to reflect the checkpoint trusted situation by the Markov model and the weight of checkpoint,and finally synthesized the checkpoint trusted situation to determine the software trust value.Experimental results showed that the model could effectively reflect the trusted situation of the various parts of the software,and verify the rationality and availability of the model. |
format | Article |
id | doaj-art-9211aef84c1c4f76b611cdf44e18acee |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2015-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-9211aef84c1c4f76b611cdf44e18acee2025-01-14T06:45:35ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-01-013623023659690438Checkpoint trust evaluation method based on MarkovJun-feng TIANYa-jiao ZHANGAccording to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically.The model reflected the software running situation by some checkpoints worked in the software behavior trace,then divided some trust levels to reflect the checkpoint trusted situation by the Markov model and the weight of checkpoint,and finally synthesized the checkpoint trusted situation to determine the software trust value.Experimental results showed that the model could effectively reflect the trusted situation of the various parts of the software,and verify the rationality and availability of the model.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015026/software trust evaluationcheckpointMarkov modelGaussian mixture model |
spellingShingle | Jun-feng TIAN Ya-jiao ZHANG Checkpoint trust evaluation method based on Markov Tongxin xuebao software trust evaluation checkpoint Markov model Gaussian mixture model |
title | Checkpoint trust evaluation method based on Markov |
title_full | Checkpoint trust evaluation method based on Markov |
title_fullStr | Checkpoint trust evaluation method based on Markov |
title_full_unstemmed | Checkpoint trust evaluation method based on Markov |
title_short | Checkpoint trust evaluation method based on Markov |
title_sort | checkpoint trust evaluation method based on markov |
topic | software trust evaluation checkpoint Markov model Gaussian mixture model |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015026/ |
work_keys_str_mv | AT junfengtian checkpointtrustevaluationmethodbasedonmarkov AT yajiaozhang checkpointtrustevaluationmethodbasedonmarkov |