Skip to main content
. 2021 Feb 3;7:e362. doi: 10.7717/peerj-cs.362

Table 5. Template for identifying LSs.

Template for identifying loss scenarios with five guide words.

IFBs GW: Function Itself GW: Env- Function Inputs GW: Env- Calling Behaviors GW: Env- Computing Resources GW: Env- Links
S_Fn_ IFBm S_Fn_ IFBm_LSp S_Fn_ IFBm_LSp + 1 S_Fn_ IFBm_LSp + 2 S_Fn_ IFBm_LSp + 3 S_Fn_ IFBm_LSp + 4
(e.g.) Encryption process violates the time limits Process algorithm is modified, which leads to the timeout Input size exceeds the limits but is not detected / Computing resource is occupied by others maliciously /
(e.g.) Data leaks in the transmission No or inadequate anti-leakage mechanism is used / / / Transmission channel is monitored illegally