Modelling and detecting the cascade vulnerability problem using soft constraints

Research output: Contribution to conferencePaperpeer-review

Abstract

Establishing network security is based not just on the security of its component systems but also on how they are configured to interoperate. In this paper we consider how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security. Taking the constraints approach means that we are building on techniques that have proven success in solving large-scale problems from other domains.

Original languageEnglish
Pages383-390
Number of pages8
Publication statusPublished - 2004
EventApplied Computing 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing - Nicosia, Cyprus
Duration: 14 Mar 200417 Mar 2004

Conference

ConferenceApplied Computing 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing
Country/TerritoryCyprus
CityNicosia
Period14/03/0417/03/04

Keywords

  • Constraints
  • Multilevel Security
  • Security
  • Soft Constraints

Fingerprint

Dive into the research topics of 'Modelling and detecting the cascade vulnerability problem using soft constraints'. Together they form a unique fingerprint.

Cite this