Table 5. Template for identifying LSs.
Template for identifying loss scenarios with five guide words.
IFBs | GW: Function Itself | GW: Env- Function Inputs | GW: Env- Calling Behaviors | GW: Env- Computing Resources | GW: Env- Links |
---|---|---|---|---|---|
S_Fn_ IFBm | S_Fn_ IFBm_LSp | S_Fn_ IFBm_LSp + 1 | S_Fn_ IFBm_LSp + 2 | S_Fn_ IFBm_LSp + 3 | S_Fn_ IFBm_LSp + 4 |
(e.g.) Encryption process violates the time limits | Process algorithm is modified, which leads to the timeout | Input size exceeds the limits but is not detected | / | Computing resource is occupied by others maliciously | / |
(e.g.) Data leaks in the transmission | No or inadequate anti-leakage mechanism is used | / | / | / | Transmission channel is monitored illegally |