2005
DOI: 10.3233/jcs-2005-13502
|View full text |Cite
|
Sign up to set email alerts
|

A soft constraint-based approach to the cascade vulnerability problem

Abstract: The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for cascading paths that violate security, in a circuitous manner, across a network. In this paper we show how constraint satisfaction provides a natural approach to expressing the necessary constraints to ensure multilevel secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…The approach that is of particular interest to us is the work proposed by Bistarelli et al [1]. We are extending this approach, by associating weights to all connections between computer systems.…”
Section: ) Formal Definitionmentioning
confidence: 99%
See 4 more Smart Citations
“…The approach that is of particular interest to us is the work proposed by Bistarelli et al [1]. We are extending this approach, by associating weights to all connections between computer systems.…”
Section: ) Formal Definitionmentioning
confidence: 99%
“…Taking into account these additional features (such as bandwidth) constitutes our improvement to the approach of Bistarelli et al [1].…”
Section: B Input Data (Informal Description)mentioning
confidence: 99%
See 3 more Smart Citations