Abstract
Establishing network security is based not just on the security of its component systems but also on how they are configured to interoperate. In this paper we consider how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security. Taking the constraints approach means that we are building on techniques that have proven success in solving large-scale problems from other domains.
| Original language | English |
|---|---|
| Pages | 383-390 |
| Number of pages | 8 |
| Publication status | Published - 2004 |
| Event | Applied Computing 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing - Nicosia, Cyprus Duration: 14 Mar 2004 → 17 Mar 2004 |
Conference
| Conference | Applied Computing 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing |
|---|---|
| Country/Territory | Cyprus |
| City | Nicosia |
| Period | 14/03/04 → 17/03/04 |
Keywords
- Constraints
- Multilevel Security
- Security
- Soft Constraints