메뉴 건너뛰기




Volumn 27, Issue 3, 2009, Pages 315-322

SAT-solving approaches to context-aware enterprise network security management

Author keywords

Boolean Satisfiability Problem (SAT); Computer Network Management; Computer Network Security; Risk Analysis; Security

Indexed keywords

ATTACK PATHS; BOOLEAN SATISFIABILITY; BOOLEAN SATISFIABILITY PROBLEM (SAT); COMPLEX TASKS; COMPUTER NETWORK MANAGEMENT; COMPUTER NETWORK SECURITY; CONTEXT-AWARE; ENTERPRISE NETWORKS; ENTERPRISE SYSTEMS; LOGICAL FRAMEWORKS; MISCONFIGURATION; SAT-SOLVING; SECURITY; SECURITY PROBLEMS; USABILITY REQUIREMENTS;

EID: 64249112993     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2009.090407     Document Type: Article
Times cited : (28)

References (23)
  • 1
    • 0024631953 scopus 로고
    • What you always wanted to know about Datalog (and never dared to ask)
    • Stefano Ceri, Georg Gottlob, and Letizia Tanca. What you always wanted to know about Datalog (and never dared to ask). IEEE Trans. Knowledge Data Eng., 1(1):146-166, 1989.
    • (1989) IEEE Trans. Knowledge Data Eng , vol.1 , Issue.1 , pp. 146-166
    • Ceri, S.1    Gottlob, G.2    Tanca, L.3
  • 4
    • 33749564382 scopus 로고    scopus 로고
    • On solving the partial MAX-SAT problem
    • Armin Biere and Carla P. Gomes, editors
    • Zhaohui Fu and Sharad Malik. On solving the partial MAX-SAT problem. In Armin Biere and Carla P. Gomes, editors, Proc. Theory Applications Satisfiability Testing - SAT 2006, pages 252-265, 2006.
    • (2006) Proc. Theory Applications Satisfiability Testing - SAT , pp. 252-265
    • Fu, Z.1    Malik, S.2
  • 5
    • 46149116824 scopus 로고    scopus 로고
    • Solving the Minimum-Cost Satisfiability problem using SAT based branch and bound search
    • San Jose, CA, USA
    • Zhaohui Fu and Sharad Malik. Solving the Minimum-Cost Satisfiability problem using SAT based branch and bound search. In Proc.International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 2006.
    • (2006) Proc.International Conference on Computer-Aided Design (ICCAD)
    • Fu, Z.1    Malik, S.2
  • 7
    • 20444498659 scopus 로고    scopus 로고
    • Topological analysis of network attack vulnerability
    • V. Kumar, J. Srivastava, and A. Lazarevic, editors, chapter 5. Kluwer Academic Publisher
    • Sushil Jajodia, Steven Noel, and Brian O'Berry. Topological analysis of network attack vulnerability. In V. Kumar, J. Srivastava, and A. Lazarevic, editors, Managing Cyber Threats: Issues, Approaches and Challanges, chapter 5. Kluwer Academic Publisher, 2003.
    • (2003) Managing Cyber Threats: Issues, Approaches and Challanges
    • Jajodia, S.1    Noel, S.2    O'Berry, B.3
  • 9
    • 64249165645 scopus 로고    scopus 로고
    • Xiao Yu Li. Optimization Algorithms for the Minimum-Cost Satisfiability Problem. PhD thesis, North Carolina State University, Raleigh, North Carolina, 2004.
    • Xiao Yu Li. Optimization Algorithms for the Minimum-Cost Satisfiability Problem. PhD thesis, North Carolina State University, Raleigh, North Carolina, 2004.
  • 11
    • 34047168454 scopus 로고    scopus 로고
    • An annotated review of past papers on attack graphs
    • Technical report, MIT Lincoln Laboratory, March
    • Richard Lippmann and Kyle W. Ingols. An annotated review of past papers on attack graphs. Technical report, MIT Lincoln Laboratory, March 2005.
    • (2005)
    • Lippmann, R.1    Ingols, K.W.2
  • 12
    • 64249101522 scopus 로고    scopus 로고
    • Evaluating and strengthening enterprise network security using attack graphs. Technical Report ESC-TR-2005-064, MIT Lincoln Laboratory, October
    • Richard P. Lippmann, Kyle W. Ingols, Chris Scott, Keith Piwowarski, Kendra Kratkiewicz, Michael Artz, and Robert Cunningham. Evaluating and strengthening enterprise network security using attack graphs. Technical Report ESC-TR-2005-064, MIT Lincoln Laboratory, October 2005.
    • (2005)
    • Lippmann, R.P.1    Ingols, K.W.2    Scott, C.3    Piwowarski, K.4    Kratkiewicz, K.5    Artz, M.6    Cunningham, R.7
  • 13
    • 26444568158 scopus 로고    scopus 로고
    • Yogesh S. Mahajan, Zhaohui Fu, and Sharad Malik. Zchaff2004: An efficient SAT solver. In Lecture Notes in Computer Science SAT 2004 Special pages 360-375. LNCS 3542, 2004.
    • Yogesh S. Mahajan, Zhaohui Fu, and Sharad Malik. Zchaff2004: An efficient SAT solver. In Lecture Notes in Computer Science SAT 2004 Special Volume, pages 360-375. LNCS 3542, 2004.
  • 14
    • 0036576020 scopus 로고    scopus 로고
    • Vasco M. Manquinho and Jo ao P. Marques-Silva. Search pruning techniques in SAT-based branch-and-bound algorithmsfor the binate covering problem. IEEE Trans. Computer-Aided Design, 21:505-516, 2002.
    • Vasco M. Manquinho and Jo ao P. Marques-Silva. Search pruning techniques in SAT-based branch-and-bound algorithmsfor the binate covering problem. IEEE Trans. Computer-Aided Design, 21:505-516, 2002.
  • 22
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-cost network hardening using attack graphs
    • November
    • Lingyu Wang, Steven Noel, and Sushil Jajodia. Minimum-cost network hardening using attack graphs. Computer Communications, 29:3812- 3824, November 2006.
    • (2006) Computer Communications , vol.29 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.