메뉴 건너뛰기




Volumn , Issue , 2004, Pages 808-813

Detecting and eliminating the cascade vulnerability problem from multilevel security networks using soft constraints

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT THEORY; INTEROPERABILITY; NETWORKS (CIRCUITS); PROBLEM SOLVING; RISK ASSESSMENT; THEOREM PROVING;

EID: 9444295894     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (17)
  • 1
    • 84948414101 scopus 로고    scopus 로고
    • Soft constraints for security protocol analysis: Confidentiality
    • LNCS 1990
    • Bella, G., and Bistarelli, S. 2001. Soft Constraints for Security Protocol Analysis: Confidentiality. In Proc. of PADL'01, LNCS 1990, 108-122.
    • (2001) Proc. of PADL'01 , pp. 108-122
    • Bella, G.1    Bistarelli, S.2
  • 5
    • 0031095278 scopus 로고    scopus 로고
    • Semiring-based Constraint Solving and Optimization
    • Bistarelli, S.; Montanari, U.; and Rossi, F. 1997. Semiring-based Constraint Solving and Optimization. JACM 44(2):201-236.
    • (1997) JACM , vol.44 , Issue.2 , pp. 201-236
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 7
    • 0027559721 scopus 로고
    • A shortest path network security model
    • Fitch, J. A., and Hoffman, L. J. 1993. A shortest path network security model. Computers and Security 12(2):169-189.
    • (1993) Computers and Security , vol.12 , Issue.2 , pp. 169-189
    • Fitch, J.A.1    Hoffman, L.J.2
  • 9
    • 0027969913 scopus 로고
    • The complexity and composability of secure interoperation
    • Oakland, CA: IEEE Comp. Soc. Press
    • Gong, L., and Qian, X. 1994. The complexity and composability of secure interoperation. In Proceedings of the Symposium on Security and Privacy, 190-200. Oakland, CA: IEEE Comp. Soc. Press.
    • (1994) Proceedings of the Symposium on Security and Privacy , pp. 190-200
    • Gong, L.1    Qian, X.2
  • 10
    • 0032045587 scopus 로고    scopus 로고
    • The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction
    • Gritalis, S., and Spinellis, D. 1998. The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction. Microprocessors and Microsystems 21(10):621-628.
    • (1998) Microprocessors and Microsystems , vol.21 , Issue.10 , pp. 621-628
    • Gritalis, S.1    Spinellis, D.2
  • 11
    • 84974751467 scopus 로고
    • The cascade vulnerability problem
    • Horton, R., et al. 1993. The cascade vulnerability problem, Journal of Computer Security 2(4):279-290.
    • (1993) Journal of Computer Security , vol.2 , Issue.4 , pp. 279-290
    • Horton, R.1
  • 14
    • 0028567611 scopus 로고
    • A filtering algorithm for constraints of difference in csps
    • Regin, J.-C. 1994. A filtering algorithm for constraints of difference in csps. In Proceedings AAAI-94, 362-367.
    • (1994) Proceedings AAAI-94 , pp. 362-367
    • Regin, J.-C.1
  • 15
    • 2442558738 scopus 로고
    • Computer security requirements - Guidance for applying the department of defense trusted computer system evaluation criteria in specific environments
    • National Computer Security Center. Orange Book
    • TCSEC. 19385. Computer security requirements - guidance for applying the department of defense trusted computer system evaluation criteria in specific environments. Technical Report CSC-STD-003-85, National Computer Security Center. Orange Book.
    • (1985) Technical Report , vol.CSC-STD-003-85
  • 16
    • 2442613539 scopus 로고
    • Trusted computer system evaluation criteria: Trusted network interpretation
    • National Computer Security Center. Red Book
    • TNI. 1987. Trusted computer system evaluation criteria: Trusted network interpretation. Technical report, National Computer Security Center. Red Book.
    • (1987) Technical Report
  • 17
    • 0001737878 scopus 로고    scopus 로고
    • Practical applications of constraint programming
    • Wallace, M. 1996. Practical applications of constraint programming. Constraints 1(1-2):139-168.
    • (1996) Constraints , vol.1 , Issue.1-2 , pp. 139-168
    • Wallace, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.