[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3136825.3136887acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Attribute-based approach of defining the secure behavior of automata objects

Published: 13 October 2017 Publication History

Abstract

The article proposes an enhanced behavior model using graphs of state transitions. The properties and advantages of the proposed model are discussed, UML-based Cooperative Interaction of Automata Objects (CIAO) language is described, attribute approach on its parsing mechanism is introduced. The proposed model for describing behavior is aimed at achieving higher reliability and productivity indicators when designing the secure architecture and implementing reactive and distributed systems in comparison with traditional methods. A side-by-side goal is to create a convenient publication language for describing parallel algorithms and distributed reactive systems. The offered model has advantages under certain conditions in comparison with other models of behavior description in the field of the description of asynchronous distributed reacting systems.

References

[1]
M. Langeheinrich. 2011. Privacy by Design âĂŞ Principles of Privacy Aware Ubiquitous System. In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp 2011). ACM, New York, NY, 273--291.
[2]
ĐŚP.A. Nixon, W. Wagealla, C. English, S. Terzis. 2005. Chapter 11. Security, Privacy and Trust Issues in Smart Environments. In Smart Environments: Technologies, Protocols, and Applications. New York: Wiley.
[3]
D. Levonevskiy, A. Saveliev, I. Vatamaniuk. 2017. Integration of Corporate Electronic Services into a Smart Space Using Temporal Logic of Actions. In Proceedings of the 2nd International Conference Âăon Interactive ÂăCollaborative Robotics (ICR 2017). In press.
[4]
A.Y. Atiskov, F.A. Novikov, L.N. Fedorchenko et al. 2013. Ontology-Based Analysis of Cryptography Standards and Possibilities of Their Harmonization. In Theory and Practice of Cryptography Solutions for Secure Information Systems. Hershey: IGI Global, 1--33.
[5]
J.E. Hopcroft, R. Motwani, J.D. 2001. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 521 p.
[6]
C. Bock, J. Odell. 2011. Ontological Behavior Modeling. Journal of Object Technology. 10, 1--36.
[7]
E. BÃürger, R. StÃd'rk. 2003. Abstract State Machines. A Method for High-Level System Design and Analysis. Springer, Berlin, 438 p.
[8]
C. Bock. 1999. Three Kinds of Behavior Models. Journal of Object-Oriented Programming. 12 (4), 36--39.
[9]
D. Harel. 1987. Statecharts: a Visual Formalism for Complex Systems. Science of Computer Programming. 8, 231--274. (87) 90035-9
[10]
B. Meyer. 2000. Object-Oriented Software Construction. Prentice-Hall, New Jersey, 1406 p.
[11]
L. Fedorchenko. 2006. On Regularization of Context-Free Grammars. Izvestiya vuzov. Priborostroyeniye. 49 (11), 50âĂŞ54.
[12]
K. Schwab. 2016. The Fourth Industrial Revolution. World Economic Forum.

Cited By

View all
  • (2019)Verification of internet protocol properties using cooperating automaton objectsProceedings of the 12th International Conference on Security of Information and Networks10.1145/3357613.3357639(1-4)Online publication date: 12-Sep-2019
  • (2019)Estimation of the influence of variations in the dimensional parameters car’s generator active zone set of a on its technical characteristics, through elasticity coefficients (influences)IOP Conference Series: Materials Science and Engineering10.1088/1757-899X/666/1/012083666(012083)Online publication date: 7-Dec-2019
  • (2018)Architecture of the Software System for Adaptive Protection of Network InfrastructureProceedings of the 11th International Conference on Security of Information and Networks10.1145/3264437.3264467(1-4)Online publication date: 10-Sep-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '17: Proceedings of the 10th International Conference on Security of Information and Networks
October 2017
321 pages
ISBN:9781450353038
DOI:10.1145/3136825
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automatic programming
  2. behavior model
  3. parallel behavior
  4. secure behavior
  5. security of distributed systems
  6. the architecture of reacting systems

Qualifiers

  • Research-article

Conference

SIN '17
SIN '17: Security of Information and Networks
October 13 - 15, 2017
Jaipur, India

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Verification of internet protocol properties using cooperating automaton objectsProceedings of the 12th International Conference on Security of Information and Networks10.1145/3357613.3357639(1-4)Online publication date: 12-Sep-2019
  • (2019)Estimation of the influence of variations in the dimensional parameters car’s generator active zone set of a on its technical characteristics, through elasticity coefficients (influences)IOP Conference Series: Materials Science and Engineering10.1088/1757-899X/666/1/012083666(012083)Online publication date: 7-Dec-2019
  • (2018)Architecture of the Software System for Adaptive Protection of Network InfrastructureProceedings of the 11th International Conference on Security of Information and Networks10.1145/3264437.3264467(1-4)Online publication date: 10-Sep-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media