{"id":"https://openalex.org/W2704891328","doi":"https://doi.org/10.1109/tase.2017.8285631","title":"Time-sensitive information flow control in timed event-B","display_name":"Time-sensitive information flow control in timed event-B","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2704891328","doi":"https://doi.org/10.1109/tase.2017.8285631","mag":"2704891328"},"language":"en","primary_location":{"id":"doi:10.1109/tase.2017.8285631","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2017.8285631","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101794403","display_name":"Chunyan Mu","orcid":"https://orcid.org/0000-0002-2988-6939"},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Chunyan Mu","raw_affiliation_strings":["School of Computing, Teesside University, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Teesside University, UK","institution_ids":["https://openalex.org/I874055015"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042013137","display_name":"Shengchao Qin","orcid":"https://orcid.org/0000-0003-3028-8191"},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shengchao Qin","raw_affiliation_strings":["School of Computing, Teesside University, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Teesside University, UK","institution_ids":["https://openalex.org/I874055015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101794403"],"corresponding_institution_ids":["https://openalex.org/I874055015"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06972734,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.799896240234375},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.6632254123687744},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.6287456154823303},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.547687828540802},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.48076745867729187},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.42471349239349365},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4176560044288635},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.4124354124069214},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39240118861198425},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35259222984313965},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3314529359340668},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.2976178526878357},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18554678559303284},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17702338099479675},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.14057913422584534},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12789422273635864}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.799896240234375},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.6632254123687744},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.6287456154823303},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.547687828540802},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.48076745867729187},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.42471349239349365},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4176560044288635},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.4124354124069214},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39240118861198425},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35259222984313965},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3314529359340668},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2976178526878357},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18554678559303284},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17702338099479675},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.14057913422584534},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12789422273635864},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tase.2017.8285631","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2017.8285631","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Symposium on Theoretical Aspects of Software Engineering (TASE)","raw_type":"proceedings-article"},{"id":"pmh:oai:https://research.tees.ac.uk/ws/oai:publications/6a617e87-cbc5-497c-9e3b-ee55eef4f0a0","is_oa":false,"landing_page_url":"https://research.tees.ac.uk/en/publications/6a617e87-cbc5-497c-9e3b-ee55eef4f0a0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401198","display_name":"TeesRep (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.atira.dk:publications/6a617e87-cbc5-497c-9e3b-ee55eef4f0a0","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402475","display_name":"Teesside University Research Portal (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:tees.openrepository.com:10149/621236","is_oa":false,"landing_page_url":"http://hdl.handle.net/10149/621236","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Meetings and Proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1519566437","https://openalex.org/W1526774512","https://openalex.org/W1536910713","https://openalex.org/W1572388405","https://openalex.org/W1585940114","https://openalex.org/W1602676319","https://openalex.org/W1971486022","https://openalex.org/W1977764760","https://openalex.org/W1997775274","https://openalex.org/W2010352770","https://openalex.org/W2034527657","https://openalex.org/W2037851672","https://openalex.org/W2057503672","https://openalex.org/W2104647943","https://openalex.org/W2116647386","https://openalex.org/W2129278597","https://openalex.org/W2149465027","https://openalex.org/W2168686464","https://openalex.org/W2173102238","https://openalex.org/W2180221446","https://openalex.org/W2262585037","https://openalex.org/W4248121140","https://openalex.org/W6631521589","https://openalex.org/W6634214969"],"related_works":["https://openalex.org/W2092798601","https://openalex.org/W2054093036","https://openalex.org/W1587042134","https://openalex.org/W1670050423","https://openalex.org/W2978920629","https://openalex.org/W2774600468","https://openalex.org/W3212518706","https://openalex.org/W2095925360","https://openalex.org/W4246377515","https://openalex.org/W1549956274"],"abstract_inverted_index":{"Protecting":[0],"confidential":[1],"data":[2],"in":[3,59,85,115],"today's":[4],"computing":[5],"environments":[6],"is":[7,33],"an":[8],"important":[9,34],"problem.":[10],"Information":[11],"flow":[12,57,73,101,113,144],"control":[13,114],"can":[14,91],"help":[15],"to":[16,35,70,76,157,177,186],"avoid":[17],"information":[18,56,72,112],"leakage":[19],"and":[20,75,103,132,152],"violations":[21],"introduced":[22,80],"by":[23,81,129,168],"executing":[24],"the":[25,41,45,52,60,82,116,137,148,159,166,170,182,188],"software":[26,29],"applications.":[27],"In":[28],"development":[30],"cycle,":[31],"it":[32],"handle":[36],"security":[37,58,74,145,171,189],"related":[38],"issues":[39],"from":[40],"beginning":[42],"specifications":[43],"at":[44],"level":[46],"of":[47,54,89,99,162],"abstract.":[48],"Mu":[49],"[1]":[50],"investigated":[51],"problem":[53,98],"preserving":[55],"Event-B":[61,66,117,127,150],"specification":[62,118],"models.":[63],"A":[64],"typed":[65],"model":[67],"was":[68],"presented":[69],"enforce":[71],"prevent":[77],"direct":[78],"flows":[79,164],"system.":[83],"However,":[84],"practice,":[86],"timing":[87,121,163],"behaviours":[88],"programs":[90],"also":[92,106],"introduce":[93],"a":[94,125,142,154],"covert":[95,160],"flow.":[96],"The":[97],"run-time":[100],"monitoring":[102],"controlling":[104],"must":[105],"be":[107],"addressed.":[108],"This":[109],"paper":[110],"investigates":[111],"language":[119],"with":[120],"constructs.":[122],"We":[123,140,173],"present":[124,153],"timed":[126,149,179],"system":[128,138,156,167],"introducing":[130],"timers":[131],"relevant":[133],"time":[134],"constraints":[135],"into":[136],"events.":[139],"suggest":[141],"time-sensitive":[143],"condition":[146],"for":[147,165],"systems,":[151],"type":[155],"close":[158],"channels":[161],"ensuring":[169],"condition.":[172,190],"then":[174],"investigate":[175],"how":[176],"refine":[178],"events":[180],"during":[181],"stepwise":[183],"refinement":[184],"modelling":[185],"satisfy":[187]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
