Based on the presentation of the security vulnerability of the event-driven system, this paper points out the deep reasons for the vulnerability of system: (1) The system ignores the inherent correlation among events; (2) The system trusts events from any sources without condition. In view of these two reasons, this paper presents an analytical model for security of event sequence, and an evaluation model of trustworthiness based on event source. Furthermore, this paper constructs an improved event-driven system infrastructure based on the two models.
参考文献
相似文献
引证文献
引用本文
何鸿君,曹四化,褚祖高,等.一种改进的事件驱动系统框架[J].国防科技大学学报,2008,30(3):70-75. HE Hongjun, CAO Sihua, CHU Zugao, et al. An Improved Event-driven System Infrastructure[J]. Journal of National University of Defense Technology,2008,30(3):70-75.