Volume 41 Issue 5
May  2017
Article Contents

TANG Yong-xin, YU Da-tai. Metrics of Interaction Inherent Security Based on Input Point Complexity[J]. Journal of University of Electronic Science and Technology of China, 2012, 41(5): 787-791. doi: 10.3969/j.issn.1001-0548.2012.05.027
Citation: TANG Yong-xin, YU Da-tai. Metrics of Interaction Inherent Security Based on Input Point Complexity[J]. Journal of University of Electronic Science and Technology of China, 2012, 41(5): 787-791. doi: 10.3969/j.issn.1001-0548.2012.05.027

Metrics of Interaction Inherent Security Based on Input Point Complexity

doi: 10.3969/j.issn.1001-0548.2012.05.027
  • Received Date: 2011-09-06
  • Rev Recd Date: 2012-03-10
  • Publish Date: 2012-10-15
  • Traditional interaction security measurement method can not reflect the inherent security of software interaction basic attributes. In order to remedy this deficiency, this paper presents a method for the metrics of interaction inherent security. Through analyzing intrinsic security problems existed in the basic attributes of interaction, we puts forward the concepts of input-point complexity and input-point concentration ratio etc.,proposes a metric model of the inherent security of interaction of software based on input-point concentration ratio,and measures the inherent security of interaction of software through three examples. The measurement results show that it is effective by using input-point concentration ratio to measure inherent security of interaction. This method greatly reduces the disturbance of the changing of external factors on the metric results and, therefore,improves the credibility, integrity, and generality of the results.
  • 加载中
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Article Metrics

Article views(3533) PDF downloads(38) Cited by()

Related
Proportional views

Metrics of Interaction Inherent Security Based on Input Point Complexity

doi: 10.3969/j.issn.1001-0548.2012.05.027

Abstract: Traditional interaction security measurement method can not reflect the inherent security of software interaction basic attributes. In order to remedy this deficiency, this paper presents a method for the metrics of interaction inherent security. Through analyzing intrinsic security problems existed in the basic attributes of interaction, we puts forward the concepts of input-point complexity and input-point concentration ratio etc.,proposes a metric model of the inherent security of interaction of software based on input-point concentration ratio,and measures the inherent security of interaction of software through three examples. The measurement results show that it is effective by using input-point concentration ratio to measure inherent security of interaction. This method greatly reduces the disturbance of the changing of external factors on the metric results and, therefore,improves the credibility, integrity, and generality of the results.

TANG Yong-xin, YU Da-tai. Metrics of Interaction Inherent Security Based on Input Point Complexity[J]. Journal of University of Electronic Science and Technology of China, 2012, 41(5): 787-791. doi: 10.3969/j.issn.1001-0548.2012.05.027
Citation: TANG Yong-xin, YU Da-tai. Metrics of Interaction Inherent Security Based on Input Point Complexity[J]. Journal of University of Electronic Science and Technology of China, 2012, 41(5): 787-791. doi: 10.3969/j.issn.1001-0548.2012.05.027

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return