Citation: | LV Junjie, WANG Yuanzhuo, LI Jingyuan, et al., “Security Analysis for Web Service Behaviors Based on Hierarchical Stochastic Game Model,” Chinese Journal of Electronics, vol. 24, no. 3, pp. 449-454, 2015, doi: 10.1049/cje.2015.07.002 |
L.J. Zhang and D.A. Grier, "Service oriented computing is overrated: Information infrastructure problems cannot be solved by service oriented computing (SOC) alone pro or con", Business week, 2008.
|
D. Kuo, A. Fekete, P. Greenfield and S. Nepal, "Expressing and reasoning about service contracts in service-oriented computing", Proceedings of the International Conference on Web Services, ICWS, pp.915-918, 2006.
|
P. Lindstrom, "Attacking and defending web service", A Spire Research Report, Tech. Rep., 2004.
|
A. Avizienis, J. Laprie, B. Randell and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing", IEEE Transactions on Dependable and Secure Computing, Vol.1, No.1, pp.11-34, 2004.
|
D.M. Nicol, W.H. Sanders and K.S. Trivedi, "Model-based evaluation: From dependability to security", IEEE Transactions on Dependable and Secure Computing, Vol.1, No.1, pp.48-66, 2004.
|
C. Landwehr, "Formal models for computer security", Computer Surveys, Vol.13, No.3, pp.247-278, 1981.
|
C. Lin, Y.Z. Wang and Y. Wang, "A stochastic game nets based approach for network security analysis", Proceedings of the 29th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency, Concurrency Methods: Issues and Applications Workshop, pp.21-33, 2008.
|
Y.Z.Wang, C. Lin and K. Meng, "Security analysis of enterprise network based on stochastic game nets model", Proceedings of the International Conference on Communications, ICC, 2009.
|
J. Filar and K. Vrieze, Competitive Markov Decision Processes, Springer-Verlag, New York, 1996.
|
G. Ciaodo, J. Muppala and K.S. Trivedi, "SPNP: Stochastic Petri net package", Proceedings of Petri Nets and Performance Models, pp.142-151, 1989.
|