메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 383-390

Modelling and detecting the cascade vulnerability problem using soft constraints

Author keywords

Constraints; Multilevel Security; Security; Soft Constraints

Indexed keywords

APPROXIMATION THEORY; CONSTRAINT THEORY; INTEROPERABILITY; LINEAR PROGRAMMING; PROBLEM SOLVING; PUBLIC POLICY; RISK ASSESSMENT; SECURITY OF DATA;

EID: 2442501617     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (29)
  • 1
    • 2442558738 scopus 로고
    • Computer security requirements - Guidance for applying the department of defense trusted computer system evaluation criteria in specific environments
    • Orange Book
    • Computer security requirements - guidance for applying the department of defense trusted computer system evaluation criteria in specific environments. Technical Report CSC-STD-003-85, 1985. Orange Book.
    • (1985) Technical Report , vol.CSC-STD-003-85
  • 2
    • 2442613539 scopus 로고
    • Trusted computer system evaluation criteria: Trusted network interpretation
    • National Computer Security Center, Red Book
    • Trusted computer system evaluation criteria: Trusted network interpretation. Technical report, National Computer Security Center, 1987. Red Book.
    • (1987) Technical Report
  • 9
    • 0031095278 scopus 로고    scopus 로고
    • Semiring-based Constraint Solving and Optimization
    • Mar
    • S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Solving and Optimization. Journal of the ACM, 44(2):201-236, Mar 1997.
    • (1997) Journal of the ACM , vol.44 , Issue.2 , pp. 201-236
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 13
    • 26144472279 scopus 로고    scopus 로고
    • Constraint programming based column generation for crew assignment
    • University of Paderborn
    • T. Fahle, U. Junker, S. Karisch, N. Kohl, M. Sellmann, and B. Vaaben, Constraint programming based column generation for crew assignment. Technical Report TR-RI-99-212, University of Paderborn, 1999.
    • (1999) Technical Report , vol.TR-RI-99-212
    • Fahle, T.1    Junker, U.2    Karisch, S.3    Kohl, N.4    Sellmann, M.5    Vaaben, B.6
  • 14
    • 0027559721 scopus 로고
    • A shortest path network security model
    • J. A. Fitch and L. J. Hoffman. A shortest path network security model. Computers and Security, 12(2):169-189, 1993.
    • (1993) Computers and Security , vol.12 , Issue.2 , pp. 169-189
    • Fitch, J.A.1    Hoffman, L.J.2
  • 16
    • 0027969913 scopus 로고
    • The complexity and composability of secure interoperation
    • Oakland, CA, May IEEE Computer Society Press
    • L. Gong and X. Qian. The complexity and composability of secure interoperation. In Proceedings of the Symposium on Security and Privacy, pages 190-200, Oakland, CA, May 1994. IEEE Computer Society Press.
    • (1994) Proceedings of the Symposium on Security and Privacy , pp. 190-200
    • Gong, L.1    Qian, X.2
  • 17
    • 0032045587 scopus 로고    scopus 로고
    • The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction
    • S. Gritalis and D. Spinellis. The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction. Microprocessors and Microsystems, 21(10):621-628, 1998.
    • (1998) Microprocessors and Microsystems , vol.21 , Issue.10 , pp. 621-628
    • Gritalis, S.1    Spinellis, D.2
  • 19
    • 84974751467 scopus 로고
    • The cascade vulnerability problem
    • R. Horton et al. The cascade vulnerability problem. Journal of Computer Security, 2(4):279-290, 1993.
    • (1993) Journal of Computer Security , vol.2 , Issue.4 , pp. 279-290
    • Horton, R.1
  • 20
    • 0023829319 scopus 로고
    • Noninterference and the composability of security properties
    • IEEE Computer Society Press
    • D. McCullough. Noninterference and the composability of security properties. In Proceedings 1988 IEEE Symposium on Security and Privacy, pages 177-186. IEEE Computer Society Press, 1988.
    • (1988) Proceedings 1988 IEEE Symposium on Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 22
    • 0016050041 scopus 로고
    • Networks of constraints: Fundamental properties and applications to picture processing
    • U. Montanari. Networks of constraints: Fundamental properties and applications to picture processing. Information Science, 7:95-132, 1974. Also Technical Report, Carnegie Mellon University, 1971.
    • (1974) Information Science , vol.7 , pp. 95-132
    • Montanari, U.1
  • 23
    • 0016050041 scopus 로고
    • Carnegie Mellon University
    • U. Montanari. Networks of constraints: Fundamental properties and applications to picture processing. Information Science, 7:95-132, 1974. Also Technical Report, Carnegie Mellon University, 1971.
    • (1971) Technical Report
  • 26
    • 0028567611 scopus 로고
    • A filtering algorithm for constraints of difference in csps
    • J.-C. Regin. A filtering algorithm for constraints of difference in csps. In Proceedings AAAI-94, pages 362-367, 1994.
    • (1994) Proceedings AAAI-94 , pp. 362-367
    • Regin, J.-C.1
  • 27
    • 0001553684 scopus 로고
    • Possibilistic constraint satisfaction problems, or "how to handle soft constraints?"
    • T. Schiex. Possibilistic constraint satisfaction problems, or "how to handle soft constraints?". In Proc. 8th Conf. of Uncertainty in AI, pages 269-275, 1992.
    • (1992) Proc. 8th Conf. of Uncertainty in AI , pp. 269-275
    • Schiex, T.1
  • 29
    • 0001737878 scopus 로고    scopus 로고
    • Practical applications of constraint programming
    • M. Wallace. Practical applications of constraint programming. Constraints, 1(1-2):139-168, 1996.
    • (1996) Constraints , vol.1 , Issue.1-2 , pp. 139-168
    • Wallace, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.